{
  "type": "Domain",
  "indicator": "digicool.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/digicool.com",
    "alexa": "http://www.alexa.com/siteinfo/digicool.com",
    "indicator": "digicool.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2128237148,
      "indicator": "digicool.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 48,
      "pulses": [
        {
          "id": "69b95579bdc4ac1824b7ee95",
          "name": "VirusTotal report\n                    for program.exe",
          "description": "",
          "modified": "2026-04-16T13:37:13.951000",
          "created": "2026-03-17T13:22:01.672000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 101,
            "FileHash-SHA256": 114,
            "URL": 106,
            "domain": 23,
            "hostname": 66
          },
          "indicator_count": 511,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "3 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6905d40f781d7d58d4021a20",
          "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
          "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
          "modified": "2025-12-20T06:00:23.758000",
          "created": "2025-11-01T09:34:07.323000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8332,
            "domain": 4819,
            "hostname": 2165,
            "FileHash-SHA256": 7369,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 23637,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69137ee5d76d486d65396af0",
          "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-11T18:22:29.976000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906c12b1dd6a64ab1beaa55",
          "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-02T02:25:47.431000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68633fde7c1aa942569f774a",
          "name": "Feebs worm  | Residential Rental Community Denver, Co",
          "description": "Feebs worms t is  spread using email or P2P networks via  HTML application file that installs the worm on infected attachment..\n\nFeebs IoC\u2019s\n[FileHash-MD5\n0cfc4ba2ee11d21f85220fd7ee2c6058]\n[FileHash-SHA1\n3d5e2dd53ed5a52bb5f39e4d21ecc46a1ff1659a]\n[FileHash-SHA256\nee3151ed4dc44ef0a9a5fefa5236177cedbc7d8e4d74f126e6428ae0b938e09b]\n Indicator Facts:\n- 6 malicious files communicating\n- Blocked by Quad9\n- IRCbot\n\u2022 worm.feebs.ae \u2022\n#dga #running_webserver #feebs #trojan #spy #bot #ransom #virtool #irc #backfdoor #worm #dropper #banker #registrarabuse #droppedconnectionstoday #operation #data_selling #binary #infection #pointing #backdoor #domain_prefix #ping +\u2026",
          "modified": "2025-07-31T01:02:04.870000",
          "created": "2025-07-01T01:54:38.111000",
          "tags": [
            "united",
            "name servers",
            "search",
            "date",
            "passive dns",
            "urls",
            "address",
            "creation date",
            "contact",
            "status",
            "showing",
            "unknown ns",
            "ip address",
            "aaaa",
            "local",
            "ipv4",
            "pulse pulses",
            "files",
            "hosting",
            "reverse dns",
            "location united",
            "america flag",
            "hostname",
            "redacted for",
            "win32",
            "heur",
            "backdoor",
            "win32dh",
            "indicator",
            "quad9",
            "destination",
            "port",
            "show",
            "unknown",
            "as12041",
            "irc pong",
            "irc ping",
            "entries",
            "malware",
            "copy",
            "virustotal",
            "write",
            "drweb",
            "domain related",
            "finding notes",
            "microsoft worm",
            "submit url",
            "analysis",
            "trojanspy",
            "virtool",
            "expiration date",
            "hostname add",
            "win32sality feb",
            "america asn",
            "dns resolutions",
            "otx telemetry"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 133,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 455,
            "URL": 43,
            "domain": 167,
            "hostname": 225,
            "email": 8
          },
          "indicator_count": 1161,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "262 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6888820cbdf42f46edc8e5ed",
          "name": "NORAD TRACKING ",
          "description": "",
          "modified": "2025-07-29T08:10:52.558000",
          "created": "2025-07-29T08:10:52.558000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6512660b83a8b8fedc8d0d7b",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 240,
            "FileHash-SHA1": 211,
            "FileHash-SHA256": 984,
            "URL": 513,
            "domain": 443,
            "hostname": 382
          },
          "indicator_count": 2773,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "264 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6512660b83a8b8fedc8d0d7b",
          "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
          "description": "https://www.virustotal.com/gui/collection/a8b8fd7a4dc70c3d6dedfa9f183ad49f89229a74b674da48c9e7a08af6f84fa4",
          "modified": "2025-07-29T02:53:38.769000",
          "created": "2023-09-26T05:03:07.873000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 240,
            "FileHash-SHA1": 211,
            "FileHash-SHA256": 984,
            "URL": 513,
            "domain": 443,
            "hostname": 382
          },
          "indicator_count": 2773,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 178,
          "modified_text": "264 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e00320d65236e032faa26a",
          "name": "Global- Injection | Phone service modification campaign - Cryprsoft",
          "description": "Malicious\u00bb http://www.forensickb.com/2013/03/file-entropy-explained.html | Cryptsoft | ET ,\nVirus:Win32/Sality.AT ,\nWin32:Kukacka , TrojanSpy:Win32/Nivdort.AJ , Worm:Win32/Mydoom.O!backdoor , \nWorm:Win32/Bloored , TrojanSpy:Win32/Invader.S!MSR , \nText: Mydoom spreading via SMTP 29 192.168.56.110 198.133.159.125 2018340 ET TROJAN Win32.Sality-GR Checkin 192.168.56.110 52.28.249.128 2018340 ET TROJAN Win32.Sality-GR Checkin 192.168.56.110 166.78.145.90 2016803 ET TROJAN Known Sinkhole Response Header 166.78.145.90 192.168.56.110 2018\nATT&CK | Query Registry , Modify Existing Service , Scheduled Task/Job , Process Injection , Registry Run Keys / Startup Folder , System Information Discovery , Disabling Security Tools , Modify Registry",
          "modified": "2024-10-10T08:03:36.798000",
          "created": "2024-09-10T08:28:16.120000",
          "tags": [
            "amazonaws",
            "employment scam",
            "pe resource",
            "united",
            "as15169 google",
            "aaaa",
            "unknown",
            "search",
            "as44273 host",
            "passive dns",
            "all scoreblue",
            "worm",
            "files",
            "error",
            "code",
            "emails",
            "ireland",
            "poland",
            "high",
            "yara detections",
            "virus",
            "msvisualcpp2003",
            "high process",
            "injection t1055",
            "t1055",
            "icmp traffic",
            "pe file",
            "service",
            "win32",
            "copy",
            "tools",
            "cryptsoft",
            "nxdomain",
            "a br",
            "key management",
            "meta",
            "open",
            "twitter",
            "a domains",
            "cryptsoft src",
            "meet cryptsoft",
            "products a",
            "authority",
            "record value",
            "contact",
            "metro",
            "log id",
            "gmtn",
            "go daddy",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "windows nt",
            "msie",
            "read c",
            "ms windows",
            "intel",
            "et trojan",
            "pe32",
            "zip archive",
            "write",
            "possible",
            "malware",
            "beethoven",
            "et",
            "body",
            "scan endpoints",
            "category",
            "file samples",
            "files matching",
            "date hash",
            "phishing",
            "show",
            "t1045",
            "nrv2x",
            "lzma",
            "laszlo molnar",
            "john reiser",
            "antivirus",
            "xp sp2",
            "sp2 working",
            "alerts",
            "contacted",
            "0pgtwhu",
            "filehash",
            "february",
            "crack.zip",
            "as396982 google",
            "urls",
            "domain",
            "hostname",
            "next",
            "belgium unknown",
            "status",
            "name servers",
            "creation date",
            "date",
            "servers",
            "entries",
            "trojan",
            "ipv4",
            "pulse pulses",
            "ransom",
            "gandcrab",
            "active",
            "parking crews"
          ],
          "references": [
            "Researched: http://www.forensickb.com/2013/03/file-entropy-explained.html",
            "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
            "www.crackedmindstechnologies.com",
            "IDS Detections: Tempedreve Checkin Hiloti Style GET to PHP with invalid terse MSIE headers W32/Bayrob Attempted Checkin 2",
            "Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup) Worm.Mydoom Checkin",
            "IDS Detections:  User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
            "IDS Detections: Worm.Mydoom Checkin User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin",
            "IDS Detections: Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
            "relay.cryptsoft.com | smtp.cryptsoft.com\t| ghs.google.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Romania",
            "Netherlands",
            "Poland",
            "Belgium",
            "Germany",
            "Spain",
            "Italy",
            "Czechia",
            "Austria",
            "Bulgaria",
            "Canada",
            "United Arab Emirates"
          ],
          "malware_families": [
            {
              "id": "Virus:Win32/Sality.AT",
              "display_name": "Virus:Win32/Sality.AT",
              "target": "/malware/Virus:Win32/Sality.AT"
            },
            {
              "id": "Win32:Kukacka",
              "display_name": "Win32:Kukacka",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom.O!backdoor",
              "display_name": "Worm:Win32/Mydoom.O!backdoor",
              "target": "/malware/Worm:Win32/Mydoom.O!backdoor"
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.AJ",
              "display_name": "TrojanSpy:Win32/Nivdort.AJ",
              "target": "/malware/TrojanSpy:Win32/Nivdort.AJ"
            },
            {
              "id": "TrojanSpy:Win32/Invader.S!MSR",
              "display_name": "TrojanSpy:Win32/Invader.S!MSR",
              "target": "/malware/TrojanSpy:Win32/Invader.S!MSR"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 220,
            "FileHash-MD5": 626,
            "FileHash-SHA1": 539,
            "FileHash-SHA256": 1335,
            "domain": 501,
            "hostname": 617,
            "email": 4,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 3844,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "556 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "666de04fd3531dc0896346a1",
          "name": "Skynet | Emotet | Nivdort | WhiteSky Communications_SPOOFED | Denver, Co",
          "description": "ISP of targets very close associate is spoofed. Ad. Full CnC . It's all there. Pulse better NOT be modified. Jeffrey Scott Reimer DPT who allegedly SA'd target hasn't been put under ANY scrutiny, a weakly written police report exists. A very healthy very fit woman who went to physical therapy left with a spinal cord injury, ACM, TBI, central nervous system injuries, separated hips & SI joints due to the great force of 'SA'. A letter from an MD demanded investigation as to how target ended up with injuries she didn't arrive with. Minor injury. Placed at MMI by 1st PT. It was insisted she to go to Reimer. She has a power wheelchair now. Now  victim is a suspect needing to be surveilled. PT is now victim of unnamed crime against this 6'3 brut. Hacker Brian Sabey states Reimer hired him.  Surveillance, bold confrontations, physically, verbally & cyber attacks need to stop. Countless SA victims probably go through something, but this?  Shhhh. Silence please. Reimer needs to live his life.",
          "modified": "2024-08-14T06:01:01.267000",
          "created": "2024-06-15T18:41:19.343000",
          "tags": [
            "historical ssl",
            "referrer",
            "project skynet",
            "cyber army",
            "page dow",
            "poser",
            "scammer",
            "security",
            "bitfender",
            "parked",
            "read c",
            "search",
            "show",
            "high",
            "unknown",
            "united",
            "pe32",
            "intel",
            "ms windows",
            "entries",
            "copy",
            "hupigon",
            "upatre",
            "explorer",
            "write",
            "win32",
            "malware",
            "defender",
            "passive dns",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "get na",
            "possible",
            "sinkhole cookie",
            "value snkz",
            "medium",
            "nivdort",
            "service",
            "next",
            "arbor networks",
            "pulse pulses",
            "body",
            "contact",
            "date",
            "sha256",
            "sha1",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "ascii text",
            "null",
            "hybrid",
            "refresh",
            "span",
            "june",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "ip address",
            "domain",
            "ip related",
            "as55293 a2",
            "status",
            "as8068",
            "creation date",
            "otx telemetry",
            "emails",
            "expiration date",
            "name servers",
            "america asn",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr3",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "first",
            "win32 exe",
            "identifier",
            "info",
            "dns replication",
            "technology",
            "passive",
            "user",
            "downloads",
            "text",
            "internet files",
            "storage",
            "firefox c",
            "pings c",
            "written c",
            "files deleted",
            "destination ip",
            "threat roundup",
            "april",
            "september",
            "october",
            "december",
            "january",
            "august",
            "hr rtd",
            "bot networks",
            "listen",
            "awful",
            "skynet",
            "ptls7",
            "clng",
            "cdate",
            "ygjpaufscontext",
            "flashpix",
            "bhja",
            "error resume",
            "voun2hd",
            "odx3x33jk9w3",
            "false",
            "template",
            "crash",
            "emotet",
            "project",
            "pe32 executable",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "vs2008",
            "data rticon",
            "kyrgyz default",
            "default",
            "rticon kyrgyz",
            "info compiler",
            "products",
            "vs2005",
            "header intel",
            "name md5",
            "domains",
            "csc corporate",
            "com laude",
            "registrarsafe",
            "namecheap inc",
            "psiusa",
            "domain robot",
            "ii llc",
            "hetzner online",
            "gmbh",
            "type name",
            "file type",
            "kb file",
            "ip detections",
            "country",
            "contacted",
            "hashes",
            "file system",
            "pegasus",
            "targets sa",
            "survivor",
            "matches rule",
            "virus network",
            "comcast",
            "hiddentear",
            "critical",
            "installer",
            "targets tsara brashears",
            "trojan evader",
            "trojan malware",
            "npzk765",
            "content type",
            "a domains",
            "as16276",
            "body doctype",
            "public w3cdtd",
            "xhtml",
            "xmlns http",
            "gmt server",
            "accept",
            "graph",
            "http requests",
            "connect",
            "dns resolutions",
            "ip traffic",
            "remote debian spy",
            "search debian available space",
            "hacking",
            "targeting",
            "indostealer",
            "law firm",
            "showing",
            "x00x00",
            "trustinfo",
            "registry",
            "external ip",
            "observed",
            "administrator",
            "persistence",
            "execution",
            "hallrender",
            "west domains",
            "trojan",
            "memcommit",
            "pe section",
            "low software",
            "packing t1045",
            "t1045",
            "pe resource",
            "jeffrey scott reimer"
          ],
          "references": [
            "https://whiteskycommunications.com/_Spoofed",
            "https://otx.alienvault.com/indicator/file/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031",
            "213.91.128.133 CnC AS 8866 (Vivacom Bulgaria EAD) BG - Miner",
            "0039ca3853af262af65326399713d4e45340eec4c3ea789be19335f06f090993",
            "Matches rule PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority Matches rule ET POLICY Cryptocurrency Miner Checkin Matches rule PUA-OTHER Cryptocurrency Miner outbound connection attempt",
            "https://twitter.com/PORNO_SEXYBABES",
            "IDS Detections: Win32/Emotet CnC Activity (POST) M9 GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1",
            "https://otx.alienvault.com/indicator/file/0274c7ffe81ebc6310a2857348a6653d0abbfca780238a854992b7b786bb1d72",
            "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html - scrubbed and for sale.",
            "https://mypornsnap.top/photos/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears thousands of sites surfaced online",
            "It has taken years to slow the constant malicious DGA domains , they still keep smearing target only.",
            "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "http://www.metanetworks.org/tsara-lynn-brashears-dead",
            "hxxps://onlyindianporn.net/videos/tsara-brashears/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Infostealer/Win.SmokeLoader.R439087",
              "display_name": "Infostealer/Win.SmokeLoader.R439087",
              "target": null
            },
            {
              "id": "Alibaba Ransom:Win32/StopCrypt",
              "display_name": "Alibaba Ransom:Win32/StopCrypt",
              "target": "/malware/Alibaba Ransom:Win32/StopCrypt"
            },
            {
              "id": "W32.AIDetect.malware2",
              "display_name": "W32.AIDetect.malware2",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Nivdort",
              "display_name": "ALF:TrojanSpy:Nivdort",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.RQ!MSR",
              "display_name": "Trojan:Win32/Glupteba.RQ!MSR",
              "target": "/malware/Trojan:Win32/Glupteba.RQ!MSR"
            },
            {
              "id": "Win.Dropper.Tofsee-9799489-0",
              "display_name": "Win.Dropper.Tofsee-9799489-0",
              "target": null
            },
            {
              "id": "Win32:DropperX-gen\\ [Drp]",
              "display_name": "Win32:DropperX-gen\\ [Drp]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1574.008",
              "name": "Path Interception by Search Order Hijacking",
              "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 4,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 334,
            "FileHash-SHA1": 332,
            "FileHash-SHA256": 2760,
            "URL": 3080,
            "domain": 2294,
            "hostname": 1436,
            "CVE": 1,
            "email": 7,
            "CIDR": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 10247,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "613 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66933b9c8be1a5b9e24de941",
          "name": "Worm:Win32/Enosch - Affecting YouTube, Google and more",
          "description": "",
          "modified": "2024-08-13T02:01:24.759000",
          "created": "2024-07-14T02:44:44.457000",
          "tags": [
            "june",
            "october",
            "july",
            "tracking",
            "december",
            "apple ios",
            "relacionada",
            "partru",
            "plugx",
            "cryptbot",
            "hacktool",
            "lockbit",
            "as8075",
            "united",
            "slot1",
            "mascore2",
            "bcnt1",
            "nct1",
            "arc1",
            "ems1",
            "auth1",
            "localeenus",
            "date",
            "default",
            "show",
            "regsetvalueexa",
            "search",
            "regdword",
            "medium",
            "settingswpad",
            "delete",
            "ids detections",
            "yara detections",
            "worm",
            "malware",
            "copy",
            "write",
            "win32",
            "unknown",
            "asnone united",
            "as14061",
            "status",
            "creation date",
            "name servers",
            "cname",
            "next",
            "passive dns",
            "as15169 google",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "as63949 linode",
            "html",
            "gmt content",
            "moved",
            "encrypt",
            "body",
            "record value",
            "emails",
            "domain name",
            "error",
            "code",
            "algorithm",
            "key usage",
            "v3 serial",
            "number",
            "public key",
            "info",
            "key algorithm",
            "subject key",
            "identifier",
            "x509v3 crl",
            "first",
            "as6185 apple",
            "japan",
            "as8068",
            "as714 apple",
            "aaaa",
            "as32244 liquid",
            "nxdomain",
            "as44273 host",
            "script urls",
            "meta",
            "as31154 toyota",
            "belgium unknown",
            "belgium",
            "pulse submit",
            "url analysis",
            "win32 exe",
            "android",
            "servers",
            "files",
            "name",
            "domain",
            "ashley",
            "sylvia",
            "sonja",
            "file type",
            "karin",
            "gina",
            "christine",
            "kathrin",
            "sandy"
          ],
          "references": [
            "http://www.google.com/images/errors/robot.png",
            "beacons.bcp.gvt.com, desktop.google.co.id,  drive.google.com, google.com  , https.www.google.com",
            "nr-data.net [Apple Private Data Collection]",
            "47.courier-push-apple.com.akadns.net",
            "Antivirus Detections: Win32:Agent-ASTI\\ [Trj] ,  Win.Trojan.Agent-357800 ,  Worm:Win32/Enosch!atmn",
            "IDS Detections: Win32/Enosch.A gtalk connectivity check | Yara Detections: md5_constants",
            "Alerts: network_icmp network_smtp persistence_autorun modifies_proxy_wpad dumped_buffer",
            "Alerts: network_http antivm_network_adapters smtp_gmail antivm_queries_computername checks_debugger",
            "Worm:Win32/Enosch: FileHash-SHA256\t00001fce075ec7fe698d6ede804939221afcf40750027fde6b29a75af85ea2cc",
            "Worm:Win32/Enosch: FileHash-SHA1 c1f7aeab8ae436f1e94bce12a465db736850f4d5",
            "Worm:Win32/Enosch: FileHash-MD5 c98108ca8f4e0dd8a3f63d4ac490e115",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Unlocker]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Enosch!atmn",
              "display_name": "Worm:Win32/Enosch!atmn",
              "target": "/malware/Worm:Win32/Enosch!atmn"
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Media",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 146,
            "FileHash-SHA1": 126,
            "FileHash-SHA256": 1422,
            "URL": 377,
            "domain": 889,
            "hostname": 418,
            "SSLCertFingerprint": 1,
            "email": 10
          },
          "indicator_count": 3389,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "614 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6656f87db820343369559ce4",
          "name": "Apple iOS - Software Packing | Win.Trojan.Crypted-30 | Hidden User |",
          "description": "Auto generated 'Tags' spontaneously removed. I am not being allowed to add tags.\nStill apple, law firm, framing, hackers, Colorado. targeting , framing, dangerous continuous attacks.\nApple inc Python email.",
          "modified": "2024-06-28T09:04:20.583000",
          "created": "2024-05-29T09:42:21.905000",
          "tags": [],
          "references": [
            "dns1.advancedstream.net | AS30170 isomedia inc | Lakewood, Colorado",
            "Alerts:  dead_host network_icmp nolookup_communication persistence_autorun packer_polymorphic creates_exe packer_entropy pe_features",
            "https://otx.alienvault.com/indicator/file/2079c31dbbb26f4f63be03304f899d21d92a82146b89a2b5b78c24c4728d2d87",
            "ma1-aaemail-dr-lapp03.apple.com | mail.python.org >AS714 Apple inc. = 188.166.95.178"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Crypted-30",
              "display_name": "Win.Trojan.Crypted-30",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 391,
            "hostname": 471,
            "URL": 705,
            "email": 1,
            "FileHash-SHA256": 1471,
            "FileHash-MD5": 105,
            "FileHash-SHA1": 102
          },
          "indicator_count": 3246,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "660 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7119615db47ea27706a86",
          "name": "Esurance Remote Attacks| Emotet | Lolkek  | Part I",
          "description": "Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it's evolved to become a major threat to users everywhere.\n\nLater versions evolved to use macro-enabled documents to retrieve the virus payload from command and control. They have been advised .",
          "modified": "2024-04-12T23:03:13.367000",
          "created": "2024-01-29T02:46:46.076000",
          "tags": [
            "ssl certificate",
            "xamzexpires600",
            "whois record",
            "url collection",
            "collections",
            "historical ssl",
            "referrer",
            "contacted",
            "resolutions",
            "web gateway",
            "emotet",
            "urls http",
            "whois whois",
            "domains",
            "lolkek",
            "core",
            "caddywiper",
            "awful",
            "urls url",
            "cymulate",
            "malware",
            "com laude",
            "ltd dba",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "internet domain",
            "service bs",
            "corp",
            "dynadot",
            "twitter",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "graph community",
            "origin1",
            "ver33",
            "dtamlb",
            "smlb",
            "csc corporate",
            "gandi sas",
            "namecheap inc",
            "google",
            "amazon02",
            "apple",
            "remote attacks"
          ],
          "references": [
            "https://www.esurance.com/",
            "https://www.malwarebytes.com/emotet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Telecom",
            "Civil Society",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9102,
            "CVE": 5,
            "FileHash-MD5": 68,
            "FileHash-SHA1": 67,
            "FileHash-SHA256": 2209,
            "domain": 1427,
            "hostname": 4334
          },
          "indicator_count": 17212,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "736 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c3bd803f15cd94aab6e287",
          "name": "Lumma Stealer | Colorado Medical Center HCA",
          "description": "Needs further investigation. Miscellaneous attack affecting Denver physicians directory. Visitors accessing the page using insecure devices may be affected. PII & PHI breached. Monitoring.",
          "modified": "2024-03-08T17:04:03.644000",
          "created": "2024-02-07T17:27:28.349000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "resolutions",
            "problems",
            "siblings domain",
            "whois whois",
            "startpage",
            "httponly",
            "samesitenone",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "language",
            "html document",
            "unicode text",
            "utf8 text",
            "doctype",
            "anchor hrefs",
            "hrefs",
            "denver",
            "tsara brashears",
            "apple ios",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "contacted urls",
            "hacktool",
            "malicious",
            "download",
            "malware",
            "relic",
            "monitoring",
            "domains",
            "eurodns sa",
            "markmonitor",
            "ip detections",
            "country",
            "graph",
            "https",
            "mitre att",
            "ta0007 network",
            "t1046 sends",
            "ssdp",
            "command",
            "control ta0011",
            "protocol t1071",
            "performs dns",
            "layer protocol",
            "number",
            "cus cndigicert",
            "ja3s",
            "subject",
            "sha2 secure",
            "server ca",
            "odigicert inc",
            "cus cnmicrosoft",
            "algorithm",
            "memory pattern",
            "file system",
            "registry",
            "registry keys",
            "process",
            "created",
            "processes tree",
            "february",
            "healthone",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "url https",
            "reverse dns",
            "general full",
            "security tls",
            "protocol h2",
            "software",
            "frankfurt",
            "main",
            "germany",
            "resource hash",
            "de indicators",
            "hashes",
            "value",
            "scriptsrcelem",
            "variables",
            "boomrmq string",
            "boomrapikey",
            "boomr function",
            "system",
            "babelpolyfill",
            "assign function",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "aes256gcm",
            "level",
            "akamaiasn1",
            "europeberlin",
            "generic malware",
            "tag count",
            "tue dec",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "root ca",
            "pattern match",
            "authority",
            "span",
            "presbyterianst",
            "luke",
            "medical center",
            "class",
            "accept",
            "date",
            "refresh",
            "blood",
            "liver cancer",
            "breast cancer",
            "lung cancer",
            "kidney cancer",
            "skin cancer",
            "sarcoma",
            "prostate cancer",
            "body",
            "facebook",
            "twitter",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "cookie",
            "command and control",
            "mitre",
            "scanning host",
            "exploit source",
            "trojan",
            "callback function",
            "targets",
            "targeting",
            "samesite=none",
            "kde",
            "konqueror",
            "phi",
            "pii",
            "wTJh.exe",
            "malware ransom trojan evader rat",
            "network",
            "rat trojan",
            "relacionada",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "matches rule",
            "emotet",
            "lockbit",
            "critical",
            "copy",
            "installer",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "ursnif",
            "core",
            "as55688 pt",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "asn as55688",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "united",
            "aaaa",
            "unknown",
            "a domains",
            "search",
            "creation date",
            "record value",
            "next",
            "pornhub",
            "anyxxxtube",
            "domain",
            "gandi sas",
            "hostname",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "pe32 packer",
            "petite",
            "vs98",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "rticon neutral",
            "overlay",
            "dos exe",
            "threat roundup",
            "pe resource",
            "june",
            "lumma stealer",
            "ransomexx",
            "azorult",
            "njrat",
            "open",
            "problem",
            "plugx",
            "android",
            "sex_phot.jpg.exe",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "delphi generic",
            "icons library",
            "pe32 linker",
            "lcc linker",
            "empty hash",
            "tulach",
            "sabey",
            "rat",
            "remote",
            "remote access trojan"
          ],
          "references": [
            "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians",
            "https://www.hybrid-analysis.com/sample/63bf920be2401947bd686d7dd146af7f3e56800409307360105bf50cebb1c1ea",
            "www2.megawebfind.com [command and control]",
            "http://ifdnzact.com/?dn=megawebdeals.com&pid=9PO755G95 [ phishing]",
            "20.99.186.246 [exploit source]",
            "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians/ [heuristic]",
            "Win32:RATX-gen [Trj] identified.",
            "CS Sigma Rules: Shadow Copies Deletion Using Operating Systems Utilities by Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)",
            "CS Sigma Rules: Disable UAC Using Registry by frack113",
            "http://45.159.189.105/bot/regex [ tracking | botnet]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Password cracker | Patient being tracked through multiple medical systems]",
            "0-173-x.msn.com | https://twitter.com/PORNO_SEXYBABES | 0-3.duckdns.org | 0-212.pornhub.org | 000web.pornhub.org",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "CS Sigma Rules: Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "Remote Access Trojan"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Indonesia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Win32:RATX-gen [Trj]",
              "display_name": "Win32:RATX-gen [Trj]",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "W32/Hupigon.NCU",
              "display_name": "W32/Hupigon.NCU",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Wiper",
              "display_name": "Wiper",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 68,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 883,
            "URL": 1412,
            "FileHash-MD5": 283,
            "FileHash-SHA1": 231,
            "FileHash-SHA256": 2909,
            "domain": 824,
            "email": 3,
            "CVE": 3
          },
          "indicator_count": 6548,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "771 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c09e6935e446f36ee67d16",
          "name": "Hacked Browser \u2022 DOS \u2022 Sinkholed",
          "description": "",
          "modified": "2024-03-05T13:02:33.380000",
          "created": "2024-02-05T08:38:01.689000",
          "tags": [
            "whois record",
            "contacted",
            "ssl certificate",
            "referrer",
            "contacted urls",
            "historical ssl",
            "resolutions",
            "siblings domain",
            "threat roundup",
            "september",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "execution",
            "siblings",
            "scan endpoints",
            "all octoseek",
            "url http",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "google safe",
            "creation date",
            "cpm network",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "date",
            "showing",
            "unknown",
            "next",
            "http response",
            "final url",
            "ip address",
            "status code",
            "headers date",
            "files",
            "apple ios",
            "urls url",
            "apple",
            "password",
            "domains",
            "tmobile metro",
            "hacktool",
            "ursnif",
            "malware",
            "core",
            "tsara brashears",
            "copy",
            "tracker",
            "highly targeted",
            "sides with",
            "nanocore",
            "ransomexx",
            "quasar",
            "maui ransomware",
            "download",
            "relic",
            "monitoring",
            "installer",
            "cobalt strike",
            "phishing",
            "critical",
            "emotet",
            "exploit",
            "united",
            "win32upatre jan",
            "entries",
            "ipv4",
            "open",
            "trojan",
            "body",
            "artro",
            "status",
            "hostname",
            "cpm fun",
            "meta name",
            "malware stealer trojan evader",
            "cyber warfare",
            "urls http",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "awful",
            "june",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "pe32 executable",
            "ms windows",
            "intel",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "vs2013",
            "info compiler",
            "products id",
            "vs2013 upd4",
            "upd4",
            "header intel",
            "name md5",
            "getcursor getdc"
          ],
          "references": [
            "http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "CS IDS Rules: PROTOCOL-ICMP Destination Unreachable Host Unreachable",
            "CS IDS Rules: DS rules HIGH - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules:  ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt Unique rule identifier: This rule belongs to a private collection.",
            "CS IDS Rules:  ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
            "CS IDS Rules:  SERVER-OTHER Squid HTTP Vary response header denial of service attempt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Worm:Win32/Mimail.9c74f1f3",
              "display_name": "Worm:Win32/Mimail.9c74f1f3",
              "target": "/malware/Worm:Win32/Mimail.9c74f1f3"
            },
            {
              "id": "Win32.Virlock.Gen.1",
              "display_name": "Win32.Virlock.Gen.1",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65bf9b6b83552213615b08b6",
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1301,
            "FileHash-SHA1": 717,
            "FileHash-SHA256": 1520,
            "URL": 1249,
            "domain": 564,
            "hostname": 931,
            "email": 6,
            "CVE": 2,
            "FilePath": 1
          },
          "indicator_count": 6291,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bf9b6b83552213615b08b6",
          "name": "Hacked Browser \u2022 DOS \u2022 Sinkholed",
          "description": "Ongoing attack against targeted individual.",
          "modified": "2024-03-05T13:02:33.380000",
          "created": "2024-02-04T14:12:59.815000",
          "tags": [
            "whois record",
            "contacted",
            "ssl certificate",
            "referrer",
            "contacted urls",
            "historical ssl",
            "resolutions",
            "siblings domain",
            "threat roundup",
            "september",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "execution",
            "siblings",
            "scan endpoints",
            "all octoseek",
            "url http",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "google safe",
            "creation date",
            "cpm network",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "date",
            "showing",
            "unknown",
            "next",
            "http response",
            "final url",
            "ip address",
            "status code",
            "headers date",
            "files",
            "apple ios",
            "urls url",
            "apple",
            "password",
            "domains",
            "tmobile metro",
            "hacktool",
            "ursnif",
            "malware",
            "core",
            "tsara brashears",
            "copy",
            "tracker",
            "highly targeted",
            "sides with",
            "nanocore",
            "ransomexx",
            "quasar",
            "maui ransomware",
            "download",
            "relic",
            "monitoring",
            "installer",
            "cobalt strike",
            "phishing",
            "critical",
            "emotet",
            "exploit",
            "united",
            "win32upatre jan",
            "entries",
            "ipv4",
            "open",
            "trojan",
            "body",
            "artro",
            "status",
            "hostname",
            "cpm fun",
            "meta name",
            "malware stealer trojan evader",
            "cyber warfare",
            "urls http",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "awful",
            "june",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "pe32 executable",
            "ms windows",
            "intel",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "vs2013",
            "info compiler",
            "products id",
            "vs2013 upd4",
            "upd4",
            "header intel",
            "name md5",
            "getcursor getdc"
          ],
          "references": [
            "http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "CS IDS Rules: PROTOCOL-ICMP Destination Unreachable Host Unreachable",
            "CS IDS Rules: DS rules HIGH - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules:  ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt Unique rule identifier: This rule belongs to a private collection.",
            "CS IDS Rules:  ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
            "CS IDS Rules:  SERVER-OTHER Squid HTTP Vary response header denial of service attempt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Worm:Win32/Mimail.9c74f1f3",
              "display_name": "Worm:Win32/Mimail.9c74f1f3",
              "target": "/malware/Worm:Win32/Mimail.9c74f1f3"
            },
            {
              "id": "Win32.Virlock.Gen.1",
              "display_name": "Win32.Virlock.Gen.1",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1301,
            "FileHash-SHA1": 717,
            "FileHash-SHA256": 1520,
            "URL": 1249,
            "domain": 564,
            "hostname": 931,
            "email": 6,
            "CVE": 2,
            "FilePath": 1
          },
          "indicator_count": 6291,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bf9b680a31915bed66fe9b",
          "name": "Hacked Browser \u2022 DOS \u2022 Sinkholed",
          "description": "Ongoing attack against targeted individual.",
          "modified": "2024-03-05T13:02:33.380000",
          "created": "2024-02-04T14:12:56.167000",
          "tags": [
            "whois record",
            "contacted",
            "ssl certificate",
            "referrer",
            "contacted urls",
            "historical ssl",
            "resolutions",
            "siblings domain",
            "threat roundup",
            "september",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "execution",
            "siblings",
            "scan endpoints",
            "all octoseek",
            "url http",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "google safe",
            "creation date",
            "cpm network",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "date",
            "showing",
            "unknown",
            "next",
            "http response",
            "final url",
            "ip address",
            "status code",
            "headers date",
            "files",
            "apple ios",
            "urls url",
            "apple",
            "password",
            "domains",
            "tmobile metro",
            "hacktool",
            "ursnif",
            "malware",
            "core",
            "tsara brashears",
            "copy",
            "tracker",
            "highly targeted",
            "sides with",
            "nanocore",
            "ransomexx",
            "quasar",
            "maui ransomware",
            "download",
            "relic",
            "monitoring",
            "installer",
            "cobalt strike",
            "phishing",
            "critical",
            "emotet",
            "exploit",
            "united",
            "win32upatre jan",
            "entries",
            "ipv4",
            "open",
            "trojan",
            "body",
            "artro",
            "status",
            "hostname",
            "cpm fun",
            "meta name",
            "malware stealer trojan evader",
            "cyber warfare",
            "urls http",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "awful",
            "june",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "pe32 executable",
            "ms windows",
            "intel",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "vs2013",
            "info compiler",
            "products id",
            "vs2013 upd4",
            "upd4",
            "header intel",
            "name md5",
            "getcursor getdc"
          ],
          "references": [
            "http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "CS IDS Rules: PROTOCOL-ICMP Destination Unreachable Host Unreachable",
            "CS IDS Rules: DS rules HIGH - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules:  ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt Unique rule identifier: This rule belongs to a private collection.",
            "CS IDS Rules:  ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
            "CS IDS Rules:  SERVER-OTHER Squid HTTP Vary response header denial of service attempt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Worm:Win32/Mimail.9c74f1f3",
              "display_name": "Worm:Win32/Mimail.9c74f1f3",
              "target": "/malware/Worm:Win32/Mimail.9c74f1f3"
            },
            {
              "id": "Win32.Virlock.Gen.1",
              "display_name": "Win32.Virlock.Gen.1",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 49,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1301,
            "FileHash-SHA1": 717,
            "FileHash-SHA256": 1520,
            "URL": 1249,
            "domain": 564,
            "hostname": 931,
            "email": 6,
            "CVE": 2,
            "FilePath": 1
          },
          "indicator_count": 6291,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65de941acedcdd661f0593b6",
          "name": "Esurance Remote Attacks (Cloned. Who modifies reports? This happens to me)",
          "description": "",
          "modified": "2024-02-28T02:02:02.807000",
          "created": "2024-02-28T02:02:02.807000",
          "tags": [
            "ssl certificate",
            "xamzexpires600",
            "whois record",
            "url collection",
            "collections",
            "historical ssl",
            "referrer",
            "contacted",
            "resolutions",
            "web gateway",
            "emotet",
            "urls http",
            "whois whois",
            "domains",
            "lolkek",
            "core",
            "caddywiper",
            "awful",
            "urls url",
            "cymulate",
            "malware",
            "com laude",
            "ltd dba",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "internet domain",
            "service bs",
            "corp",
            "dynadot",
            "twitter",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "graph community",
            "origin1",
            "ver33",
            "dtamlb",
            "smlb",
            "csc corporate",
            "gandi sas",
            "namecheap inc",
            "google",
            "amazon02",
            "apple",
            "remote attacks"
          ],
          "references": [
            "https://www.esurance.com/",
            "https://www.malwarebytes.com/emotet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Telecom",
            "Civil Society",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": "65b711a6f49f057c311f2642",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8575,
            "CVE": 4,
            "FileHash-MD5": 47,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 1951,
            "domain": 1394,
            "hostname": 4095
          },
          "indicator_count": 16112,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "781 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b80763e9d9e18cf87d985b",
          "name": "Esurance Remote Attacks| Emotet | Lolkek | Part I",
          "description": "",
          "modified": "2024-02-28T02:01:51.407000",
          "created": "2024-01-29T20:15:31.163000",
          "tags": [
            "ssl certificate",
            "xamzexpires600",
            "whois record",
            "url collection",
            "collections",
            "historical ssl",
            "referrer",
            "contacted",
            "resolutions",
            "web gateway",
            "emotet",
            "urls http",
            "whois whois",
            "domains",
            "lolkek",
            "core",
            "caddywiper",
            "awful",
            "urls url",
            "cymulate",
            "malware",
            "com laude",
            "ltd dba",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "internet domain",
            "service bs",
            "corp",
            "dynadot",
            "twitter",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "graph community",
            "origin1",
            "ver33",
            "dtamlb",
            "smlb",
            "csc corporate",
            "gandi sas",
            "namecheap inc",
            "google",
            "amazon02",
            "apple",
            "remote attacks"
          ],
          "references": [
            "https://www.esurance.com/",
            "https://www.malwarebytes.com/emotet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Telecom",
            "Civil Society",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": "65b711a6f49f057c311f2642",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8575,
            "CVE": 4,
            "FileHash-MD5": 47,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 1951,
            "domain": 1394,
            "hostname": 4095
          },
          "indicator_count": 16112,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7119e9272b1426729e1ed",
          "name": "Esurance Remote Attacks| Emotet | Lolkek  | Part I",
          "description": "Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it's evolved to become a major threat to users everywhere.\n\nLater versions evolved to use macro-enabled documents to retrieve the virus payload from command and control. They have been advised .",
          "modified": "2024-02-28T02:01:51.407000",
          "created": "2024-01-29T02:46:54.594000",
          "tags": [
            "ssl certificate",
            "xamzexpires600",
            "whois record",
            "url collection",
            "collections",
            "historical ssl",
            "referrer",
            "contacted",
            "resolutions",
            "web gateway",
            "emotet",
            "urls http",
            "whois whois",
            "domains",
            "lolkek",
            "core",
            "caddywiper",
            "awful",
            "urls url",
            "cymulate",
            "malware",
            "com laude",
            "ltd dba",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "internet domain",
            "service bs",
            "corp",
            "dynadot",
            "twitter",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "graph community",
            "origin1",
            "ver33",
            "dtamlb",
            "smlb",
            "csc corporate",
            "gandi sas",
            "namecheap inc",
            "google",
            "amazon02",
            "apple",
            "remote attacks"
          ],
          "references": [
            "https://www.esurance.com/",
            "https://www.malwarebytes.com/emotet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Telecom",
            "Civil Society",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8575,
            "CVE": 4,
            "FileHash-MD5": 47,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 1951,
            "domain": 1394,
            "hostname": 4095
          },
          "indicator_count": 16112,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b711a6f49f057c311f2642",
          "name": "Esurance Remote Attacks| Emotet | Lolkek  | Part I",
          "description": "Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it's evolved to become a major threat to users everywhere.\n\nLater versions evolved to use macro-enabled documents to retrieve the virus payload from command and control. They have been advised .",
          "modified": "2024-02-28T02:01:51.407000",
          "created": "2024-01-29T02:47:02.117000",
          "tags": [
            "ssl certificate",
            "xamzexpires600",
            "whois record",
            "url collection",
            "collections",
            "historical ssl",
            "referrer",
            "contacted",
            "resolutions",
            "web gateway",
            "emotet",
            "urls http",
            "whois whois",
            "domains",
            "lolkek",
            "core",
            "caddywiper",
            "awful",
            "urls url",
            "cymulate",
            "malware",
            "com laude",
            "ltd dba",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "internet domain",
            "service bs",
            "corp",
            "dynadot",
            "twitter",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "graph community",
            "origin1",
            "ver33",
            "dtamlb",
            "smlb",
            "csc corporate",
            "gandi sas",
            "namecheap inc",
            "google",
            "amazon02",
            "apple",
            "remote attacks"
          ],
          "references": [
            "https://www.esurance.com/",
            "https://www.malwarebytes.com/emotet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Telecom",
            "Civil Society",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8575,
            "CVE": 4,
            "FileHash-MD5": 47,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 1951,
            "domain": 1394,
            "hostname": 4095
          },
          "indicator_count": 16112,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944a8149f2479b2fbc6cd1",
          "name": "Relic",
          "description": "Malicious redirect to BotNet malvertizing of a business affecting both .command YouTube distribution. YouTube encoded logins. Hacker attack, geo tracking, passwords crack, decryption, C2. Retaliation. Found in referenced Twitter link shared  with me.",
          "modified": "2024-02-01T14:01:46.735000",
          "created": "2024-01-02T17:40:17.890000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers nel",
            "maxage5184000",
            "name verdict",
            "falcon sandbox",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "whois whois",
            "historical ssl",
            "contacted",
            "highly targeted",
            "hackers",
            "botnet",
            "apple ios",
            "malicious",
            "hacktool",
            "quasar",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "file",
            "pattern match",
            "path",
            "date",
            "win64",
            "factory",
            "model",
            "comspec",
            "hybrid",
            "general",
            "click",
            "strings",
            "patch",
            "song culture",
            "tulach"
          ],
          "references": [
            "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
            "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
            "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
            "nr-data.net [Apple Private Data Collection]",
            "init.ess.apple.com [backdoor, malicious script, access via media]",
            "https://stackabuse.com/assets/images/apple",
            "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
            "location-icloud.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
            "mailtrack.io [tracking VirusTotal graphs, link trace back]",
            "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
            "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
            "https://pin.it/ [faux Pinterest for TB]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
            "114.114.114.114 [ Tulach Malware IP]",
            "13.107.136.8  [ Tulach Malware IP redirect]",
            "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
            "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
            "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
            "http://114.114.114.114/ipw.ps1",
            "194.245.148.189 [CnC]",
            "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
            "http://109.206.241.129/666bins/666.mpsl",
            "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
            "143.244.50.213 |169.150.249.162  [malware_hosting]",
            "http://watchhers.net/index.php [malware spreader]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "xred.mooo.com [pornhub trojan]",
            "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
            "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
            "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8049,
            "FileHash-MD5": 388,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 7062,
            "domain": 4401,
            "hostname": 2653,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 22769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29ff31857aafba0358e1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T18:50:39.675000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c597a4a45c8d84f0b15c1",
          "export_count": 341,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6558126013aef7ce80968842",
          "name": "PuffStealer",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-18T01:24:48.887000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c5970817e6bf8b0e5b5ff",
          "export_count": 334,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c606d74f82e547c77ad89",
          "name": "Ransom.Win64.PORNOASSET.SM1 | DeepScan:Generic.Ransom.GandCrab5",
          "description": "Ransom.Win64.PORNOASSET.SM1 DeepScan:Generic.Ransom.GandCrab5\nBlackNET RAT $WebWatson\nAuto generated results from a variety of tools.",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:30:37.089000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c597a4a45c8d84f0b15c1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:58.166000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c5970817e6bf8b0e5b5ff",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:48.087000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 339,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a78a0fc9521b8bf13ab1",
          "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
          "description": "",
          "modified": "2023-12-06T16:55:38.479000",
          "created": "2023-12-06T16:55:38.479000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 382,
            "domain": 443,
            "FileHash-SHA256": 985,
            "URL": 513,
            "FileHash-MD5": 241,
            "FileHash-SHA1": 212
          },
          "indicator_count": 2776,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a68efb9486424367d422",
          "name": "Abuse IP: 104.21.35.64 | http Spammer",
          "description": "",
          "modified": "2023-12-06T16:51:26.316000",
          "created": "2023-12-06T16:51:26.316000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 76,
            "hostname": 83,
            "URL": 280,
            "domain": 70,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 1
          },
          "indicator_count": 522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6619ab0ff98a22adc4a",
          "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
          "description": "",
          "modified": "2023-12-06T16:50:41.997000",
          "created": "2023-12-06T16:50:41.997000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 382,
            "domain": 443,
            "FileHash-SHA256": 985,
            "URL": 513,
            "FileHash-MD5": 241,
            "FileHash-SHA1": 212
          },
          "indicator_count": 2776,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709f8d5e89b0e746c45d1b",
          "name": "Abuse IP: 104.21.35.64 | http Spammer, NORAD Tracking Radar in specific link.",
          "description": "",
          "modified": "2023-12-06T16:21:33.484000",
          "created": "2023-12-06T16:21:33.484000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 76,
            "hostname": 83,
            "URL": 280,
            "domain": 70,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 1
          },
          "indicator_count": 522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f3a39d889e6d85ae6e0",
          "name": "more of the same fake or compromised pages on websites",
          "description": "",
          "modified": "2023-12-06T14:03:38.459000",
          "created": "2023-12-06T14:03:38.459000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 381,
            "domain": 237,
            "URL": 1245,
            "hostname": 539
          },
          "indicator_count": 2403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401da888067e7f6379d23e",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I'm actually uncomfortable finding this.",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:18:32.141000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d5ee5a7359a5e815a6a",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:18.712000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d73e96dd70037ed22a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:39.802000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d76b057b79aaf7ba4a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:40.239000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d8480e4a9ed725f6458",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:56.820000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401dbe47ce126e7468a2dc",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I'm actually uncomfortable finding this.",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:18:54.411000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 85,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401fcb063a0a34fa323603",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:27:39.980000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 87,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401fddb74fe1ea8506132d",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:27:57.026000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65402a8dec948bec8b0a0372",
          "name": "24 CVE's | Health Liability bDarkside 2020 Ecosystem .BEware",
          "description": "Matrix of cyber crime attacks appears to involved legal entities and a division of Workers Compensation Colorado, possibly used nationally. Targeting, monitoring, tracking, malvertizing, cyber attacks, CNC. Critical.\nCould probably be disputed $$$$ though undisputable. \nEd Said. \nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar\t\t\t\nCVE-2020-0601\t\t\t\t\t\nCVE-2018-8174\t\t\t\nCVE-2018-4893\t\t\t\nCVE-2018-0802\t\t\t\nCVE-2017-8759\t\t\t\t\t\t\nCVE-2017-8464\t\t\t\nCVE-2017-1188\t\t\t\t\nCVE-2017-0143\t\t\t\nCVE-2016-7262\t\t\t\nCVE-2014-6352\t\t\t\nCVE-2013-2465\t\t\t\nCVE-2011-2110\t\t\t\nCVE-2011-0609\t\t\t\nCVE-2010-2568\t\t\t\nCVE-2018-8453\t\t\t\nCVE-2013-1331\nCVE-2012-1856\t\t\t\t\nCVE-2012-0158\t\t\t\t\t\t\nCVE-2017-8570\t\t\t\nCVE-2017-11882\t\t\t\nCVE-2017-0199\t\t\t\t\t\t\nCVE-2017-0147\t\t\t\t\t\t\nCVE-2014-3153",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T22:13:33.427000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65403022038832e42175601f",
          "name": "CRITICAL!!! | Health Insurance Cyber threat Matrix - Darkside 2020 Ecosystem .BEware ",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T22:37:22.425000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "65402a8dec948bec8b0a0372",
          "export_count": 95,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4604,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23,
            "URI": 1
          },
          "indicator_count": 25942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654140bae73f795aa914e8de",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Target Tsara Brashears",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-31T18:00:26.439000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "65401d73e96dd70037ed22a7",
          "export_count": 98,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544cbbca7610e92e4262c47",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Targeting",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-11-03T10:30:20.965000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "654140bae73f795aa914e8de",
          "export_count": 108,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f13ade80603a204f85670",
          "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
          "description": "",
          "modified": "2023-10-30T02:23:41.754000",
          "created": "2023-10-30T02:23:41.754000",
          "tags": [
            "malware",
            "spyware",
            "virustotal",
            "spearfishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6516c28e5f2cee6e16d2ee69",
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 241,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 985,
            "URL": 513,
            "domain": 443,
            "hostname": 382
          },
          "indicator_count": 2776,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "902 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6516c28e5f2cee6e16d2ee69",
          "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
          "description": "",
          "modified": "2023-10-26T04:02:41.559000",
          "created": "2023-09-29T12:26:54.915000",
          "tags": [
            "malware",
            "spyware",
            "virustotal",
            "spearfishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6512660b83a8b8fedc8d0d7b",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 241,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 985,
            "URL": 513,
            "domain": 443,
            "hostname": 382
          },
          "indicator_count": 2776,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "906 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6513473addd18ea027c3c781",
          "name": "Abuse IP: 104.21.35.64 | http Spammer",
          "description": "",
          "modified": "2023-09-26T21:03:54.089000",
          "created": "2023-09-26T21:03:54.089000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d584b693c6150fc39a38a8",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 79,
            "URL": 430,
            "hostname": 113,
            "FileHash-MD5": 34,
            "FileHash-SHA256": 76,
            "FileHash-SHA1": 1
          },
          "indicator_count": 733,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "935 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d584b693c6150fc39a38a8",
          "name": "Abuse IP: 104.21.35.64 | http Spammer, NORAD Tracking Radar in specific link.",
          "description": "Phishing\nAbuse\nBot\nHttp Spamming\nAdult Content smear campaign IP for Ladys.One & 2Beeg.me. Adversarial Spammers smear reputations of innocent people via tagging. Targets are not involved in adult entertainment industry. One Ladys.One potentially  Backlisted link (https://ladys.one/xxx/a-tsara-brashears-zafira-porn)  \nPositive for NORAD TRACKER and b.link infringement & other spyware\n BatLoader\nPorn tagging\nupx\ncve-2009-1122\ncve-2014-6345\nbobsoft\ncontains-pe\ncve-2014-3931\ncve-2006-5614\naspack\ncve-1999-0016\nattachment\ncve-2016-2183\ncve-2016-2569\ndownloads-pe\ncve-2005-0233\nbase64-embedded\ncontains-embedded-js\ncve-2009-1157\ncve-2001-0260\ncve-2005-0560\nxorcrypt\ncve-2005-0446\ncve-2007-0774\ncve-2015-1729\ncontains-elf\nnsis\ncve-2007-0943\narmadillo\ndownloads-pdf\nDevice Camera access\nConnectivity\nEmotet\nBlack Basta\nYandex, LLC RU in Partnership with Microsoft, Bing, Mail.Ru,\nSpider\nSpyder\nMalicious Tools\nEscalation Privileges\nViruses\nTracking\nRansomware Tracking",
          "modified": "2023-09-09T00:03:18.229000",
          "created": "2023-08-11T00:45:42.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 79,
            "URL": 430,
            "hostname": 113,
            "FileHash-MD5": 34,
            "FileHash-SHA256": 76,
            "FileHash-SHA1": 1
          },
          "indicator_count": 733,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "953 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6218ef296da429f808fd078a",
          "name": "more of the same fake or compromised pages on websites",
          "description": "",
          "modified": "2022-03-27T00:00:39.057000",
          "created": "2022-02-25T15:00:57.930000",
          "tags": [
            "ssl certificate"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1245,
            "hostname": 539,
            "FileHash-SHA256": 381,
            "domain": 237,
            "CVE": 1
          },
          "indicator_count": 2403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1484 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://stackabuse.com/assets/images/apple",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "beacons.bcp.gvt.com, desktop.google.co.id,  drive.google.com, google.com  , https.www.google.com",
        "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
        "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
        "https://twitter.com/sheriffspurlock?lang=en",
        "Doing any evil thing for mone does not compute for me.",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "http://114.114.114.114/ipw.ps1",
        "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
        "47.courier-push-apple.com.akadns.net",
        "IPv4 45.15.156.208            command_and_control",
        "IPv4 72.251.233.245           command_and_control",
        "https://otx.alienvault.com/indicator/file/0274c7ffe81ebc6310a2857348a6653d0abbfca780238a854992b7b786bb1d72",
        "https://www.esurance.com/",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "URLscan.io",
        "Alerts:  dead_host network_icmp nolookup_communication persistence_autorun packer_polymorphic creates_exe packer_entropy pe_features",
        "194.245.148.189 [CnC]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "http://www.metanetworks.org/tsara-lynn-brashears-dead",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "relay.cryptsoft.com | smtp.cryptsoft.com\t| ghs.google.com",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "nr-data.net [Apple Private Data Collection]",
        "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
        "https://www.hybrid-analysis.com/sample/63bf920be2401947bd686d7dd146af7f3e56800409307360105bf50cebb1c1ea",
        "Alerts: network_http antivm_network_adapters smtp_gmail antivm_queries_computername checks_debugger",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Unlocker]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
        "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
        "Worm:Win32/Enosch: FileHash-SHA256\t00001fce075ec7fe698d6ede804939221afcf40750027fde6b29a75af85ea2cc",
        "https://otx.alienvault.com/indicator/file/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031",
        "CS IDS Rules: DS rules HIGH - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "Cyber Threat Coalition",
        "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
        "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "https://pin.it/ [faux Pinterest for TB]",
        "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
        "fp2e7a.wpc.2be4.phicdn.net",
        "20.99.186.246 [exploit source]",
        "Matches rule PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority Matches rule ET POLICY Cryptocurrency Miner Checkin Matches rule PUA-OTHER Cryptocurrency Miner outbound connection attempt",
        "www2.megawebfind.com [command and control]",
        "CS IDS Rules: PROTOCOL-ICMP Destination Unreachable Host Unreachable",
        "ThreatFox Abuse.ch",
        "IDS Detections: Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
        "init.ess.apple.com [backdoor, malicious script, access via media]",
        "213.91.128.133 CnC AS 8866 (Vivacom Bulgaria EAD) BG - Miner",
        "https://mypornsnap.top/photos/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears thousands of sites surfaced online",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "xred.mooo.com [pornhub trojan]",
        "http://watchhers.net/index.php [malware spreader]",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "https://www.malwarebytes.com/emotet",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "IPv4 103.224.182.246        command_and_control",
        "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
        "http://ifdnzact.com/?dn=megawebdeals.com&pid=9PO755G95 [ phishing]",
        "20.99.186.246 exploit source",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "dns1.advancedstream.net | AS30170 isomedia inc | Lakewood, Colorado",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "Deep Research",
        "CS Sigma Rules: Shadow Copies Deletion Using Operating Systems Utilities by Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)",
        "13.107.136.8  [ Tulach Malware IP redirect]",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "www.crackedmindstechnologies.com",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
        "https://otx.alienvault.com/indicator/file/2079c31dbbb26f4f63be03304f899d21d92a82146b89a2b5b78c24c4728d2d87",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "Antivirus Detections: Win32:Agent-ASTI\\ [Trj] ,  Win.Trojan.Agent-357800 ,  Worm:Win32/Enosch!atmn",
        "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html - scrubbed and for sale.",
        "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/",
        "IDS Detections:  User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
        "http://45.159.189.105/bot/regex [ tracking | botnet]",
        "Worm:Win32/Enosch: FileHash-SHA1 c1f7aeab8ae436f1e94bce12a465db736850f4d5",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | Yara Detections: md5_constants",
        "Worm:Win32/Enosch: FileHash-MD5 c98108ca8f4e0dd8a3f63d4ac490e115",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "CS IDS Rules:  ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup) Worm.Mydoom Checkin",
        "https://downloaddevtools.ir/     (phishing)",
        "CS Sigma Rules: Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "IPv4 45.12.253.72.            command_and_control",
        "Hostname: www.supernetforme.com      command_and_control",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "hxxps://onlyindianporn.net/videos/tsara-brashears/",
        "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
        "http://109.206.241.129/666bins/666.mpsl",
        "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
        "ma1-aaemail-dr-lapp03.apple.com | mail.python.org >AS714 Apple inc. = 188.166.95.178",
        "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
        "IDS Detections: Worm.Mydoom Checkin User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin",
        "Remote Access Trojan",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "https://whiteskycommunications.com/_Spoofed",
        "IDS Detections: Tempedreve Checkin Hiloti Style GET to PHP with invalid terse MSIE headers W32/Bayrob Attempted Checkin 2",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Password cracker | Patient being tracked through multiple medical systems]",
        "CS Sigma Rules: Disable UAC Using Registry by frack113",
        "CS IDS Rules:  SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians/ [heuristic]",
        "114.114.114.114 [ Tulach Malware IP]",
        "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians",
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
        "CS IDS Rules:  ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt Unique rule identifier: This rule belongs to a private collection.",
        "happylifehappywife.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Win32:RATX-gen [Trj] identified.",
        "143.244.50.213 |169.150.249.162  [malware_hosting]",
        "IPv4 63.251.106.25             command_and_control",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "IDS Detections: Win32/Emotet CnC Activity (POST) M9 GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1",
        "location-icloud.com",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "It has taken years to slow the constant malicious DGA domains , they still keep smearing target only.",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "0039ca3853af262af65326399713d4e45340eec4c3ea789be19335f06f090993",
        "http://www.google.com/images/errors/robot.png",
        "URLhaus Abuse.ch",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "Hybrid Analysis",
        "init.ess.apple.com         (malicious code script)",
        "Maltiverse Research Team",
        "Researched: http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "mailtrack.io [tracking VirusTotal graphs, link trace back]",
        "IPv4 95.213.186.51              command_and_control",
        "IPv4 104.247.81.51             command_and_control",
        "Alerts: network_icmp network_smtp persistence_autorun modifies_proxy_wpad dumped_buffer",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "0-173-x.msn.com | https://twitter.com/PORNO_SEXYBABES | 0-3.duckdns.org | 0-212.pornhub.org | 000web.pornhub.org"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Lucky Mouse APT27 | NoName057(16) |  Unnamed"
          ],
          "malware_families": [
            "Agen.1045227",
            "Expiro",
            "Trojan.js.agent",
            "Backdoor.xtreme",
            "Comspec",
            "Worm:win32/bloored.e",
            "Immortal stealer",
            "Vb.emodldr.4",
            "Redcap.rlhse",
            "Kryptik.noe",
            "Apt notes",
            "Dropper.msil",
            "Win.trojan.crypted-30",
            "Heur:trojan.msoffice.alien",
            "Trojan.pws",
            "Trojan.inject",
            "Trojanspy.keylogger",
            "Zpevdo.b",
            "Agent.aso",
            "Maui ransomware",
            "Heur:trojan.msil.tasker",
            "$webwatson",
            "Loki bot",
            "Il:trojan.msilzilla",
            "Win.malware.qshell-9875653-0",
            "Js:trojan.cryxos",
            "Evo",
            "Packed.asprotect",
            "Generic.trickbot.1",
            "Heur:trojan.ole2.alien",
            "Malware.tk.generic",
            "Susp.rtf.objupdate",
            "Ml.generic",
            "Hacktool",
            "Macro.trojan.dropperd",
            "Application.sqlcrack",
            "Malwarex",
            "Maltiverse",
            "Html_redir.smr",
            "Ransom_wcry.smj",
            "Nemucod.a",
            "Win32:kukacka",
            "Exploit.msoffice",
            "Dropped:generic.ransom.dmr",
            "Dropper.trojan.agent",
            "Qvm201.0.b70b.malware",
            "Tsgeneric",
            "Gen:variant.jaiko",
            "Generic.msil.bladabindi",
            "Malicious.8c45ba",
            "Application.searchprotect",
            "Malware.heur_generic.a",
            "Adware.installmonetizer",
            "Powershell.downloader",
            "Tofsee",
            "Trojan.agent",
            "Gen:variant.msilperseus",
            "Hacktool.cheatengine",
            "Packed-gv",
            "Backdoor.androm",
            "Trojan.pornoasset",
            "Trojandownloader:linux/downldr",
            "Psw.agent",
            "Index.php",
            "Dridex",
            "Vb.pwshell.2",
            "Malicious.71b1a8",
            "Autoit.bimwt",
            "Vb.downloader.2",
            "Virus.office.qexvmc",
            "Wacatac.d6",
            "Gen:variant.mikey",
            "Trojan.tasker",
            "Heur:trojan.tasker",
            "Vb:trojan.vba.agent",
            "Gen:heur.noobyprotect",
            "Win.malware.unsafe",
            "Zbd zeus",
            "Trojan.generic",
            "Trojan:msil/burkina",
            "Backdoor.hupigon",
            "Vb.emooodldr.10",
            "Riskware.crack",
            "Alibaba ransom:win32/stopcrypt",
            "Trojan.vbkryjetor",
            "Faceliker.a",
            "Hack.patcher",
            "Vb:trojan.valyria",
            "Alf:heraklezeval:worm:win32/mimail!rfn",
            "Agen.1043164",
            "Msil.downloader",
            "Gen:variant.ser.strictor",
            "Trojan.html.phish",
            "Auslogics",
            "Heur.bzc.yax.pantera.10",
            "Worm:win32/mydoom.o!backdoor",
            "Gen:variant.revengerat",
            "Loki password stealer (pws)",
            "Trojanspy:win32/nivdort.aj",
            "Program.unwanted",
            "Riskware",
            "Trojan:win32/glupteba.rq!msr",
            "Backdoor.agent",
            "Python.keylogger",
            "Backdoor.msil.agent",
            "Gen:variant.graftor",
            "Macro.downloader.amip",
            "Win32:malware-gen",
            "Cve-2015-1650",
            "Generic.servstart.a",
            "Behavbehaveslike.pupxbi",
            "Cil.heapoverride",
            "Js:trojan.clicker",
            "Phish.jat",
            "Heur:trojan.linux.agent",
            "Trojan.php.agent",
            "Js:trojan.js.likejack",
            "Snh:script [dropper]",
            "Exploit.w32.agent",
            "Pws-fczz",
            "Tor - s0183",
            "Trojan.ekstak",
            "Malicious.d800d6",
            "Trojan.chapak",
            "Heur:backdoor.msil.nanobot",
            "W32.eheur",
            "Gamehack.dom",
            "Trojan.ole2.vbs",
            "Agent.aik.gencil.stupidcryptor",
            "Trojan.androm.gen",
            "Agen.1141126",
            "Trojan.killproc",
            "Virus.ramnit",
            "Worm:win32/enosch!atmn",
            "Redcap.zoohz",
            "Pua.gen",
            "Trojan.msil",
            "S-b748adc5",
            "Adware.kuzitui",
            "Trojan.autoruns.generickds",
            "Heur/qvm41.2.da9b.malware",
            "Win32.virlock.gen.1",
            "Gen:nn.zexaf.32515",
            "Dropper.binder",
            "Ursnif",
            "Trojan.wisdomeyes.16070401.9500",
            "Adware.downware",
            "Heur:webtoolbar.generic",
            "Lumma stealer",
            "Generic.malware.smyb",
            "Trojan.msil.injector",
            "Cil.stupidcryptor",
            "Heur:remoteadmin.generic",
            "Gamehack.crs",
            "Agen.1144657",
            "Linux.agent",
            "Possiblethreat.pallas",
            "Agent tesla",
            "Xlm.trojan.abracadabra.27",
            "Suppobox",
            "Opensubtitles.a",
            "Pwsx",
            "Agen.1030939",
            "Msil.trojan.bse",
            "Malicious.f01f67",
            "Deepscan:generic.spyagent.6",
            "Ransomware",
            "Pws.p",
            "Unsafe.ai_score_100%",
            "Win32:ratx-gen [trj]",
            "Sgeneric",
            "Js:trojan.js.faceliker",
            "Alf:trojanspy:nivdort",
            "Downldr.gen",
            "Behaveslike.ransom",
            "Pua.reg1staid",
            "Blacknet rat",
            "Trojanspy.python",
            "Trojan.ransom.generickd",
            "Scrinject.b",
            "Heur/qvm42.3.72eb.malware",
            "W32/hupigon.ncu",
            "Kuluoz.b.gen",
            "Gamehack.nl",
            "Skynet",
            "Quasar rat",
            "Win32:dropperx-gen\\ [drp]",
            "W32.trojan",
            "Trojan:vba/downldr",
            "Gen:variant.barys",
            "Backdoor.rbot",
            "Exploit cve-2017-11882",
            "Staticrr.paleokits.net",
            "Gen:variant.razy",
            "Agent.nbae",
            "Smokeloader",
            "Troj_gen.r002c0og518",
            "Gen:trojan.heur2.lptbhw@w64.hfsautob",
            "Suspicious.cloud",
            "Agent.ypez",
            "Trojan.starter js.iframe",
            "Riskware.hacktool.agent",
            "Generic.msil.passwordstealer",
            "Gen:variant.kazy",
            "Heur:exploit.generic",
            "Presenoker",
            "Agent.pwc",
            "Gen:nn.zemsilf.34128",
            "Delf.nbx",
            "Agen.1038489",
            "Heur.vba.trojan",
            "Trojan.script",
            "Application.innovativsol",
            "Azorult",
            "Artro",
            "Packed.themida.gen",
            "Elf",
            "Worm.win64.autorun",
            "Dropper.trojan.generic",
            "Kryptik.nrd",
            "Agenttesla",
            "Worm:win32/mimail.9c74f1f3",
            "Heur.msword.gen",
            "Hw32.packed",
            "Redcap.vneda",
            "Constructor.msil  linux.agent",
            "Virus.3dmax.script",
            "Js:iframe",
            "Gen:variant.ulise",
            "Kryptik",
            "Malicious.3e78cc",
            "Trojan.pws.growtopia",
            "Ransom.wannacrypt",
            "Black.gen2",
            "Ransom.win64.wacatac.oa",
            "Malicious.6e0700",
            "Trojan.doc.downloader",
            "Trojan.malware.121218",
            "Trickbot - s0266",
            "Wannacry",
            "Gen:variant.cerbu",
            "Susp.lnk",
            "Bscope.riskware",
            "Wacapew.c",
            "W32.aidetectvm",
            "Trojan.win64",
            "Gen:variant.bulz",
            "Ait.heur.cottonmouth.8.78f19bd7",
            "Trojan.notifier",
            "Generic.bitcoinminer.3",
            "Other",
            "Bscope.trojan",
            "Js:trojan.hidelink",
            "Exploit.cve",
            "Script.inf",
            "Gen:variant.ursu",
            "Wiper",
            "Downloader.certutilurlcache",
            "Trojan.malware.300983",
            "Injector.jdo",
            "Generic.asmalws",
            "Lockbit",
            "Psw.discord",
            "Agent.aik.gen",
            "Powershell.trojan",
            "Suspected of trojan.downloader.gen",
            "Trojan.psw.mimikatz",
            "Macro.agent",
            "Trojan.heur",
            "Amadey",
            "Malicious.high.ml",
            "Ransom_wcry.smalym",
            "Xegumumune.8596c22f",
            "Lolkek",
            "Script.agent",
            "Infostealer/win.smokeloader.r439087",
            "Icefog",
            "Unsafe",
            "Riskware.agent",
            "Juko",
            "Trojan:win32/qshell",
            "Dark power",
            "Riskware.netfilter",
            "Malicious.moderate.ml",
            "Heur:trojan.msoffice.stratos",
            "Gen:variant.johnnie",
            "Trojanspy:win32/invader.s!msr",
            "Webtoolbar",
            "Virus:win32/sality.at",
            "Emotet",
            "Packed.netseal",
            "Trojan.pws.agent",
            "Suspicious.low.ml",
            "Cobalt strike",
            "Malicious.11abfc",
            "Gandcrab",
            "Artemis",
            "Backdoor.poison",
            "Spyware.bobik",
            "Gen:heur.ransom.msil",
            "Bladabindi.q",
            "Dangerousobject.multi",
            "Trojan:linux/downldr",
            "Win32:evo-gen\\ [susp]",
            "Trojan.wanna",
            "Gen:heur.msil.androm",
            "Packed.vmprotect",
            "Indiloadz.bb",
            "Vb.chronos.7",
            "Injector.clds",
            "Hoax.js.phish",
            "Vba.downloader",
            "Webmonitor rat",
            "Gen:variant.symmi",
            "Wannacryptor",
            "Generic.malware",
            "Deepscan:generic.ransom.gandcrab5",
            "Phishing.html",
            "Gen:nn.zemsilf.34062",
            "Hacktool.binder",
            "Redline stealer",
            "W32.aidetect",
            "Et",
            "Feodo",
            "Phish.ab",
            "Trojan.trickbot",
            "Trojanspy.java",
            "Trojan:win32/generic",
            "Gen:variant.midie",
            "Win.dropper.tofsee-9799489-0",
            "Suspicious_gen.f47v0520",
            "Tulach",
            "Adload.ad81",
            "Behaveslike.exploit",
            "Ransom:win32/cve-2017-0147",
            "Virus.virut",
            "Androidoverlaymalware - mob-s0012",
            "Generic.msil.limerat",
            "Ransom.win64.pornoasset.sm1",
            "Trojan.delshad",
            "Trojan.indiloadz",
            "Tscope.trojan",
            "Trojan.psw.python",
            "Trojanspy",
            "Gen:nn",
            "Trojan.java",
            "Ramnit.n",
            "Injector.is.gen",
            "Trojan.packednet",
            "Troj_frs.vsntfk19",
            "Heur:adware.startsurf",
            "Trojan.trickster",
            "Gen:variant.zusy",
            "Constructor.msil",
            "Trojan.cud.gen",
            "Trojan.python",
            "Filerepmalware",
            "Trojan:python/downldr",
            "Kryptik.gucb",
            "Kryptik.fph.gen",
            "Dldr.agent",
            "Gen:heur.ransom.hiddentears",
            "Generic.msil.grwtpstealer.1",
            "Risktool.phpw",
            "Relic",
            "W32.aidetect.malware2",
            "Gen:variant.sirefef",
            "Trojan.vba",
            "Locky",
            "Suspicious.save",
            "States",
            "Blacknet",
            "Fake ,promethiumm ,strongpity",
            "Hacktool.bruteforce",
            "Trojan.downloader.generic",
            "Domains",
            "Heur:trojan.msoffice.sagent",
            "Psw.stealer",
            "Deepscan:generic.ransom.amnesiae",
            "Sdbot.caoc",
            "Html:script",
            "Virut",
            "Nanocore rat",
            "Ransomexx",
            "Inmortal",
            "Gen:heur.msil.inject"
          ],
          "industries": [
            "Telecommunications",
            "Civil society",
            "Healthcare",
            "Health",
            "Government",
            "Media",
            "Insurance",
            "Legal",
            "Technology",
            "Telecom"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 48,
  "pulses": [
    {
      "id": "69b95579bdc4ac1824b7ee95",
      "name": "VirusTotal report\n                    for program.exe",
      "description": "",
      "modified": "2026-04-16T13:37:13.951000",
      "created": "2026-03-17T13:22:01.672000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 101,
        "FileHash-SHA256": 114,
        "URL": 106,
        "domain": 23,
        "hostname": 66
      },
      "indicator_count": 511,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "3 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6905d40f781d7d58d4021a20",
      "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
      "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
      "modified": "2025-12-20T06:00:23.758000",
      "created": "2025-11-01T09:34:07.323000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8332,
        "domain": 4819,
        "hostname": 2165,
        "FileHash-SHA256": 7369,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 23637,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "120 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69137ee5d76d486d65396af0",
      "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-11T18:22:29.976000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906c12b1dd6a64ab1beaa55",
      "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-02T02:25:47.431000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68633fde7c1aa942569f774a",
      "name": "Feebs worm  | Residential Rental Community Denver, Co",
      "description": "Feebs worms t is  spread using email or P2P networks via  HTML application file that installs the worm on infected attachment..\n\nFeebs IoC\u2019s\n[FileHash-MD5\n0cfc4ba2ee11d21f85220fd7ee2c6058]\n[FileHash-SHA1\n3d5e2dd53ed5a52bb5f39e4d21ecc46a1ff1659a]\n[FileHash-SHA256\nee3151ed4dc44ef0a9a5fefa5236177cedbc7d8e4d74f126e6428ae0b938e09b]\n Indicator Facts:\n- 6 malicious files communicating\n- Blocked by Quad9\n- IRCbot\n\u2022 worm.feebs.ae \u2022\n#dga #running_webserver #feebs #trojan #spy #bot #ransom #virtool #irc #backfdoor #worm #dropper #banker #registrarabuse #droppedconnectionstoday #operation #data_selling #binary #infection #pointing #backdoor #domain_prefix #ping +\u2026",
      "modified": "2025-07-31T01:02:04.870000",
      "created": "2025-07-01T01:54:38.111000",
      "tags": [
        "united",
        "name servers",
        "search",
        "date",
        "passive dns",
        "urls",
        "address",
        "creation date",
        "contact",
        "status",
        "showing",
        "unknown ns",
        "ip address",
        "aaaa",
        "local",
        "ipv4",
        "pulse pulses",
        "files",
        "hosting",
        "reverse dns",
        "location united",
        "america flag",
        "hostname",
        "redacted for",
        "win32",
        "heur",
        "backdoor",
        "win32dh",
        "indicator",
        "quad9",
        "destination",
        "port",
        "show",
        "unknown",
        "as12041",
        "irc pong",
        "irc ping",
        "entries",
        "malware",
        "copy",
        "virustotal",
        "write",
        "drweb",
        "domain related",
        "finding notes",
        "microsoft worm",
        "submit url",
        "analysis",
        "trojanspy",
        "virtool",
        "expiration date",
        "hostname add",
        "win32sality feb",
        "america asn",
        "dns resolutions",
        "otx telemetry"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 133,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 455,
        "URL": 43,
        "domain": 167,
        "hostname": 225,
        "email": 8
      },
      "indicator_count": 1161,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "262 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6888820cbdf42f46edc8e5ed",
      "name": "NORAD TRACKING ",
      "description": "",
      "modified": "2025-07-29T08:10:52.558000",
      "created": "2025-07-29T08:10:52.558000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6512660b83a8b8fedc8d0d7b",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 240,
        "FileHash-SHA1": 211,
        "FileHash-SHA256": 984,
        "URL": 513,
        "domain": 443,
        "hostname": 382
      },
      "indicator_count": 2773,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "264 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6512660b83a8b8fedc8d0d7b",
      "name": "NORAD TRACKING (by scamcheck) 2023-06-14",
      "description": "https://www.virustotal.com/gui/collection/a8b8fd7a4dc70c3d6dedfa9f183ad49f89229a74b674da48c9e7a08af6f84fa4",
      "modified": "2025-07-29T02:53:38.769000",
      "created": "2023-09-26T05:03:07.873000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 240,
        "FileHash-SHA1": 211,
        "FileHash-SHA256": 984,
        "URL": 513,
        "domain": 443,
        "hostname": 382
      },
      "indicator_count": 2773,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 178,
      "modified_text": "264 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e00320d65236e032faa26a",
      "name": "Global- Injection | Phone service modification campaign - Cryprsoft",
      "description": "Malicious\u00bb http://www.forensickb.com/2013/03/file-entropy-explained.html | Cryptsoft | ET ,\nVirus:Win32/Sality.AT ,\nWin32:Kukacka , TrojanSpy:Win32/Nivdort.AJ , Worm:Win32/Mydoom.O!backdoor , \nWorm:Win32/Bloored , TrojanSpy:Win32/Invader.S!MSR , \nText: Mydoom spreading via SMTP 29 192.168.56.110 198.133.159.125 2018340 ET TROJAN Win32.Sality-GR Checkin 192.168.56.110 52.28.249.128 2018340 ET TROJAN Win32.Sality-GR Checkin 192.168.56.110 166.78.145.90 2016803 ET TROJAN Known Sinkhole Response Header 166.78.145.90 192.168.56.110 2018\nATT&CK | Query Registry , Modify Existing Service , Scheduled Task/Job , Process Injection , Registry Run Keys / Startup Folder , System Information Discovery , Disabling Security Tools , Modify Registry",
      "modified": "2024-10-10T08:03:36.798000",
      "created": "2024-09-10T08:28:16.120000",
      "tags": [
        "amazonaws",
        "employment scam",
        "pe resource",
        "united",
        "as15169 google",
        "aaaa",
        "unknown",
        "search",
        "as44273 host",
        "passive dns",
        "all scoreblue",
        "worm",
        "files",
        "error",
        "code",
        "emails",
        "ireland",
        "poland",
        "high",
        "yara detections",
        "virus",
        "msvisualcpp2003",
        "high process",
        "injection t1055",
        "t1055",
        "icmp traffic",
        "pe file",
        "service",
        "win32",
        "copy",
        "tools",
        "cryptsoft",
        "nxdomain",
        "a br",
        "key management",
        "meta",
        "open",
        "twitter",
        "a domains",
        "cryptsoft src",
        "meet cryptsoft",
        "products a",
        "authority",
        "record value",
        "contact",
        "metro",
        "log id",
        "gmtn",
        "go daddy",
        "tls web",
        "arizona",
        "scottsdale",
        "ca issuers",
        "false",
        "windows nt",
        "msie",
        "read c",
        "ms windows",
        "intel",
        "et trojan",
        "pe32",
        "zip archive",
        "write",
        "possible",
        "malware",
        "beethoven",
        "et",
        "body",
        "scan endpoints",
        "category",
        "file samples",
        "files matching",
        "date hash",
        "phishing",
        "show",
        "t1045",
        "nrv2x",
        "lzma",
        "laszlo molnar",
        "john reiser",
        "antivirus",
        "xp sp2",
        "sp2 working",
        "alerts",
        "contacted",
        "0pgtwhu",
        "filehash",
        "february",
        "crack.zip",
        "as396982 google",
        "urls",
        "domain",
        "hostname",
        "next",
        "belgium unknown",
        "status",
        "name servers",
        "creation date",
        "date",
        "servers",
        "entries",
        "trojan",
        "ipv4",
        "pulse pulses",
        "ransom",
        "gandcrab",
        "active",
        "parking crews"
      ],
      "references": [
        "Researched: http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "www.crackedmindstechnologies.com",
        "IDS Detections: Tempedreve Checkin Hiloti Style GET to PHP with invalid terse MSIE headers W32/Bayrob Attempted Checkin 2",
        "Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup) Worm.Mydoom Checkin",
        "IDS Detections:  User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
        "IDS Detections: Worm.Mydoom Checkin User-Agent (explwer) Hiloti/Mufanom Downloader Checkin Win32/Unruy.R Checkin",
        "IDS Detections: Ransom.Win32.Birele.gsg Checkin Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)",
        "relay.cryptsoft.com | smtp.cryptsoft.com\t| ghs.google.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Romania",
        "Netherlands",
        "Poland",
        "Belgium",
        "Germany",
        "Spain",
        "Italy",
        "Czechia",
        "Austria",
        "Bulgaria",
        "Canada",
        "United Arab Emirates"
      ],
      "malware_families": [
        {
          "id": "Virus:Win32/Sality.AT",
          "display_name": "Virus:Win32/Sality.AT",
          "target": "/malware/Virus:Win32/Sality.AT"
        },
        {
          "id": "Win32:Kukacka",
          "display_name": "Win32:Kukacka",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom.O!backdoor",
          "display_name": "Worm:Win32/Mydoom.O!backdoor",
          "target": "/malware/Worm:Win32/Mydoom.O!backdoor"
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.AJ",
          "display_name": "TrojanSpy:Win32/Nivdort.AJ",
          "target": "/malware/TrojanSpy:Win32/Nivdort.AJ"
        },
        {
          "id": "TrojanSpy:Win32/Invader.S!MSR",
          "display_name": "TrojanSpy:Win32/Invader.S!MSR",
          "target": "/malware/TrojanSpy:Win32/Invader.S!MSR"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 220,
        "FileHash-MD5": 626,
        "FileHash-SHA1": 539,
        "FileHash-SHA256": 1335,
        "domain": 501,
        "hostname": 617,
        "email": 4,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 3844,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "556 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "666de04fd3531dc0896346a1",
      "name": "Skynet | Emotet | Nivdort | WhiteSky Communications_SPOOFED | Denver, Co",
      "description": "ISP of targets very close associate is spoofed. Ad. Full CnC . It's all there. Pulse better NOT be modified. Jeffrey Scott Reimer DPT who allegedly SA'd target hasn't been put under ANY scrutiny, a weakly written police report exists. A very healthy very fit woman who went to physical therapy left with a spinal cord injury, ACM, TBI, central nervous system injuries, separated hips & SI joints due to the great force of 'SA'. A letter from an MD demanded investigation as to how target ended up with injuries she didn't arrive with. Minor injury. Placed at MMI by 1st PT. It was insisted she to go to Reimer. She has a power wheelchair now. Now  victim is a suspect needing to be surveilled. PT is now victim of unnamed crime against this 6'3 brut. Hacker Brian Sabey states Reimer hired him.  Surveillance, bold confrontations, physically, verbally & cyber attacks need to stop. Countless SA victims probably go through something, but this?  Shhhh. Silence please. Reimer needs to live his life.",
      "modified": "2024-08-14T06:01:01.267000",
      "created": "2024-06-15T18:41:19.343000",
      "tags": [
        "historical ssl",
        "referrer",
        "project skynet",
        "cyber army",
        "page dow",
        "poser",
        "scammer",
        "security",
        "bitfender",
        "parked",
        "read c",
        "search",
        "show",
        "high",
        "unknown",
        "united",
        "pe32",
        "intel",
        "ms windows",
        "entries",
        "copy",
        "hupigon",
        "upatre",
        "explorer",
        "write",
        "win32",
        "malware",
        "defender",
        "passive dns",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "get na",
        "possible",
        "sinkhole cookie",
        "value snkz",
        "medium",
        "nivdort",
        "service",
        "next",
        "arbor networks",
        "pulse pulses",
        "body",
        "contact",
        "date",
        "sha256",
        "sha1",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "pattern match",
        "ascii text",
        "null",
        "hybrid",
        "refresh",
        "span",
        "june",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "ip address",
        "domain",
        "ip related",
        "as55293 a2",
        "status",
        "as8068",
        "creation date",
        "otx telemetry",
        "emails",
        "expiration date",
        "name servers",
        "america asn",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr3",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "first",
        "win32 exe",
        "identifier",
        "info",
        "dns replication",
        "technology",
        "passive",
        "user",
        "downloads",
        "text",
        "internet files",
        "storage",
        "firefox c",
        "pings c",
        "written c",
        "files deleted",
        "destination ip",
        "threat roundup",
        "april",
        "september",
        "october",
        "december",
        "january",
        "august",
        "hr rtd",
        "bot networks",
        "listen",
        "awful",
        "skynet",
        "ptls7",
        "clng",
        "cdate",
        "ygjpaufscontext",
        "flashpix",
        "bhja",
        "error resume",
        "voun2hd",
        "odx3x33jk9w3",
        "false",
        "template",
        "crash",
        "emotet",
        "project",
        "pe32 executable",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "vs2008",
        "data rticon",
        "kyrgyz default",
        "default",
        "rticon kyrgyz",
        "info compiler",
        "products",
        "vs2005",
        "header intel",
        "name md5",
        "domains",
        "csc corporate",
        "com laude",
        "registrarsafe",
        "namecheap inc",
        "psiusa",
        "domain robot",
        "ii llc",
        "hetzner online",
        "gmbh",
        "type name",
        "file type",
        "kb file",
        "ip detections",
        "country",
        "contacted",
        "hashes",
        "file system",
        "pegasus",
        "targets sa",
        "survivor",
        "matches rule",
        "virus network",
        "comcast",
        "hiddentear",
        "critical",
        "installer",
        "targets tsara brashears",
        "trojan evader",
        "trojan malware",
        "npzk765",
        "content type",
        "a domains",
        "as16276",
        "body doctype",
        "public w3cdtd",
        "xhtml",
        "xmlns http",
        "gmt server",
        "accept",
        "graph",
        "http requests",
        "connect",
        "dns resolutions",
        "ip traffic",
        "remote debian spy",
        "search debian available space",
        "hacking",
        "targeting",
        "indostealer",
        "law firm",
        "showing",
        "x00x00",
        "trustinfo",
        "registry",
        "external ip",
        "observed",
        "administrator",
        "persistence",
        "execution",
        "hallrender",
        "west domains",
        "trojan",
        "memcommit",
        "pe section",
        "low software",
        "packing t1045",
        "t1045",
        "pe resource",
        "jeffrey scott reimer"
      ],
      "references": [
        "https://whiteskycommunications.com/_Spoofed",
        "https://otx.alienvault.com/indicator/file/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031",
        "213.91.128.133 CnC AS 8866 (Vivacom Bulgaria EAD) BG - Miner",
        "0039ca3853af262af65326399713d4e45340eec4c3ea789be19335f06f090993",
        "Matches rule PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority Matches rule ET POLICY Cryptocurrency Miner Checkin Matches rule PUA-OTHER Cryptocurrency Miner outbound connection attempt",
        "https://twitter.com/PORNO_SEXYBABES",
        "IDS Detections: Win32/Emotet CnC Activity (POST) M9 GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1",
        "https://otx.alienvault.com/indicator/file/0274c7ffe81ebc6310a2857348a6653d0abbfca780238a854992b7b786bb1d72",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html - scrubbed and for sale.",
        "https://mypornsnap.top/photos/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears thousands of sites surfaced online",
        "It has taken years to slow the constant malicious DGA domains , they still keep smearing target only.",
        "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "http://www.metanetworks.org/tsara-lynn-brashears-dead",
        "hxxps://onlyindianporn.net/videos/tsara-brashears/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Infostealer/Win.SmokeLoader.R439087",
          "display_name": "Infostealer/Win.SmokeLoader.R439087",
          "target": null
        },
        {
          "id": "Alibaba Ransom:Win32/StopCrypt",
          "display_name": "Alibaba Ransom:Win32/StopCrypt",
          "target": "/malware/Alibaba Ransom:Win32/StopCrypt"
        },
        {
          "id": "W32.AIDetect.malware2",
          "display_name": "W32.AIDetect.malware2",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Nivdort",
          "display_name": "ALF:TrojanSpy:Nivdort",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.RQ!MSR",
          "display_name": "Trojan:Win32/Glupteba.RQ!MSR",
          "target": "/malware/Trojan:Win32/Glupteba.RQ!MSR"
        },
        {
          "id": "Win.Dropper.Tofsee-9799489-0",
          "display_name": "Win.Dropper.Tofsee-9799489-0",
          "target": null
        },
        {
          "id": "Win32:DropperX-gen\\ [Drp]",
          "display_name": "Win32:DropperX-gen\\ [Drp]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1574.008",
          "name": "Path Interception by Search Order Hijacking",
          "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        }
      ],
      "industries": [
        "Technology",
        "Telecommunications",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 4,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 334,
        "FileHash-SHA1": 332,
        "FileHash-SHA256": 2760,
        "URL": 3080,
        "domain": 2294,
        "hostname": 1436,
        "CVE": 1,
        "email": 7,
        "CIDR": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 10247,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "613 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66933b9c8be1a5b9e24de941",
      "name": "Worm:Win32/Enosch - Affecting YouTube, Google and more",
      "description": "",
      "modified": "2024-08-13T02:01:24.759000",
      "created": "2024-07-14T02:44:44.457000",
      "tags": [
        "june",
        "october",
        "july",
        "tracking",
        "december",
        "apple ios",
        "relacionada",
        "partru",
        "plugx",
        "cryptbot",
        "hacktool",
        "lockbit",
        "as8075",
        "united",
        "slot1",
        "mascore2",
        "bcnt1",
        "nct1",
        "arc1",
        "ems1",
        "auth1",
        "localeenus",
        "date",
        "default",
        "show",
        "regsetvalueexa",
        "search",
        "regdword",
        "medium",
        "settingswpad",
        "delete",
        "ids detections",
        "yara detections",
        "worm",
        "malware",
        "copy",
        "write",
        "win32",
        "unknown",
        "asnone united",
        "as14061",
        "status",
        "creation date",
        "name servers",
        "cname",
        "next",
        "passive dns",
        "as15169 google",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "urls",
        "as63949 linode",
        "html",
        "gmt content",
        "moved",
        "encrypt",
        "body",
        "record value",
        "emails",
        "domain name",
        "error",
        "code",
        "algorithm",
        "key usage",
        "v3 serial",
        "number",
        "public key",
        "info",
        "key algorithm",
        "subject key",
        "identifier",
        "x509v3 crl",
        "first",
        "as6185 apple",
        "japan",
        "as8068",
        "as714 apple",
        "aaaa",
        "as32244 liquid",
        "nxdomain",
        "as44273 host",
        "script urls",
        "meta",
        "as31154 toyota",
        "belgium unknown",
        "belgium",
        "pulse submit",
        "url analysis",
        "win32 exe",
        "android",
        "servers",
        "files",
        "name",
        "domain",
        "ashley",
        "sylvia",
        "sonja",
        "file type",
        "karin",
        "gina",
        "christine",
        "kathrin",
        "sandy"
      ],
      "references": [
        "http://www.google.com/images/errors/robot.png",
        "beacons.bcp.gvt.com, desktop.google.co.id,  drive.google.com, google.com  , https.www.google.com",
        "nr-data.net [Apple Private Data Collection]",
        "47.courier-push-apple.com.akadns.net",
        "Antivirus Detections: Win32:Agent-ASTI\\ [Trj] ,  Win.Trojan.Agent-357800 ,  Worm:Win32/Enosch!atmn",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | Yara Detections: md5_constants",
        "Alerts: network_icmp network_smtp persistence_autorun modifies_proxy_wpad dumped_buffer",
        "Alerts: network_http antivm_network_adapters smtp_gmail antivm_queries_computername checks_debugger",
        "Worm:Win32/Enosch: FileHash-SHA256\t00001fce075ec7fe698d6ede804939221afcf40750027fde6b29a75af85ea2cc",
        "Worm:Win32/Enosch: FileHash-SHA1 c1f7aeab8ae436f1e94bce12a465db736850f4d5",
        "Worm:Win32/Enosch: FileHash-MD5 c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Unlocker]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Enosch!atmn",
          "display_name": "Worm:Win32/Enosch!atmn",
          "target": "/malware/Worm:Win32/Enosch!atmn"
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [
        "Media",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 146,
        "FileHash-SHA1": 126,
        "FileHash-SHA256": 1422,
        "URL": 377,
        "domain": 889,
        "hostname": 418,
        "SSLCertFingerprint": 1,
        "email": 10
      },
      "indicator_count": 3389,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "614 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "digicool.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "digicool.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776611678.4216785
}