{
  "type": "SHA256",
  "indicator": "ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330",
  "general": {
    "sections": [
      "general",
      "analysis"
    ],
    "type": "sha256",
    "type_title": "FileHash-SHA256",
    "indicator": "ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330",
    "validation": [],
    "base_indicator": {
      "id": 3010693177,
      "indicator": "ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330",
      "type": "FileHash-SHA256",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 34,
      "pulses": [
        {
          "id": "60afece345be6dfd2a66ea3c",
          "name": "Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns",
          "description": "Volexity, a security firm, has identified and identified a phishing campaign targeting government agencies across the United States and Europe that is believed to be related to APT29.",
          "modified": "2021-07-02T00:00:45.508000",
          "created": "2021-05-27T19:02:59.218000",
          "tags": [
            "cobaltstrike",
            "apt29",
            "dark halo",
            "lnk file",
            "usaid",
            "europe",
            "malware",
            "NOBELIUM"
          ],
          "references": [
            "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
            "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
            "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
            "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
            "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
          ],
          "public": 1,
          "adversary": "APT29",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "CobaltStrike",
              "display_name": "CobaltStrike",
              "target": null
            },
            {
              "id": "FreshFire",
              "display_name": "FreshFire",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1610",
              "name": "Deploy Container",
              "display_name": "T1610 - Deploy Container"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            }
          ],
          "industries": [
            "Government",
            "NGO"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 327,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 19,
            "FileHash-MD5": 42,
            "FileHash-SHA256": 74,
            "FileHash-SHA1": 62,
            "domain": 21,
            "URL": 5,
            "YARA": 3
          },
          "indicator_count": 226,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 377503,
          "modified_text": "1752 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "698e93e1ab02db8c49e8c3ed",
          "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
          "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
          "modified": "2026-04-19T08:11:41.130000",
          "created": "2026-02-13T03:00:49.872000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27678,
            "FileHash-SHA256": 47676,
            "FileHash-MD5": 42534,
            "FileHash-SHA1": 23213,
            "hostname": 33703,
            "URL": 75433,
            "SSLCertFingerprint": 30,
            "CVE": 7582,
            "email": 313,
            "FileHash-IMPHASH": 8,
            "CIDR": 26205,
            "JA3": 1,
            "IPv4": 80,
            "URI": 5
          },
          "indicator_count": 284461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1 hour ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf64eccb5d39a90a3c391e",
          "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-03-22T03:41:32.565000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": "698e93e1ab02db8c49e8c3ed",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27572,
            "FileHash-SHA256": 46076,
            "FileHash-MD5": 42177,
            "FileHash-SHA1": 22874,
            "hostname": 33438,
            "URL": 74810,
            "SSLCertFingerprint": 21,
            "CVE": 7579,
            "email": 297,
            "FileHash-IMPHASH": 8,
            "CIDR": 26203,
            "JA3": 1
          },
          "indicator_count": 281056,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 145,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf64e1d5e06aa6207f78de",
          "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-03-22T03:41:21.863000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": "698e93e1ab02db8c49e8c3ed",
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27572,
            "FileHash-SHA256": 46076,
            "FileHash-MD5": 42177,
            "FileHash-SHA1": 22874,
            "hostname": 33438,
            "URL": 74810,
            "SSLCertFingerprint": 21,
            "CVE": 7579,
            "email": 297,
            "FileHash-IMPHASH": 8,
            "CIDR": 26203,
            "JA3": 1
          },
          "indicator_count": 281056,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "682fb98d14460e00a2f5af28",
          "name": "InQuest - 22-05-2025",
          "description": "",
          "modified": "2025-06-21T23:02:56.610000",
          "created": "2025-05-22T23:55:57.793000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 335,
            "URL": 175,
            "domain": 45,
            "hostname": 33,
            "FileHash-SHA1": 29,
            "FileHash-MD5": 9
          },
          "indicator_count": 626,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "301 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "682e68a1bc32fdebbbef1623",
          "name": "InQuest - 21-05-2025",
          "description": "",
          "modified": "2025-06-20T23:02:09.595000",
          "created": "2025-05-21T23:58:25.183000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 35,
            "URL": 181,
            "FileHash-SHA1": 16,
            "FileHash-MD5": 11,
            "FileHash-SHA256": 350,
            "hostname": 56
          },
          "indicator_count": 649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "302 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709acc23b1e58ccaf05c25",
          "name": "Malwarebazaar 5",
          "description": "",
          "modified": "2023-12-06T16:01:16.464000",
          "created": "2023-12-06T16:01:16.464000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 50000,
            "FileHash-MD5": 9782,
            "FileHash-SHA1": 9782
          },
          "indicator_count": 69564,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657094512514cf25b4735082",
          "name": "IOC from some VT and github",
          "description": "",
          "modified": "2023-12-06T15:33:37.085000",
          "created": "2023-12-06T15:33:37.085000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1589,
            "FileHash-MD5": 396,
            "FileHash-SHA1": 395,
            "hostname": 211,
            "domain": 376,
            "URL": 357
          },
          "indicator_count": 3324,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570944c48bd2a6a147f53a4",
          "name": "IOC from some VT and github",
          "description": "",
          "modified": "2023-12-06T15:33:32.656000",
          "created": "2023-12-06T15:33:32.656000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1597,
            "FileHash-MD5": 397,
            "FileHash-SHA1": 396,
            "hostname": 211,
            "domain": 376,
            "URL": 357,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 3336,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090d572206e3ad162097d",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:45.671000",
          "created": "2023-12-06T15:18:45.671000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090d011f044ba6f739582",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:40.005000",
          "created": "2023-12-06T15:18:40.005000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090caee010f81d3f9b3b3",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:34.496000",
          "created": "2023-12-06T15:18:34.496000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090c40925050fed548373",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:27.916000",
          "created": "2023-12-06T15:18:27.916000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090b97242b201bad932bf",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:17.948000",
          "created": "2023-12-06T15:18:17.948000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090b3d4f53af869314497",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:11.741000",
          "created": "2023-12-06T15:18:11.741000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090a94553ecf08ba4a8bb",
          "name": "muestra",
          "description": "",
          "modified": "2023-12-06T15:18:01.636000",
          "created": "2023-12-06T15:18:01.636000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707d1d39bf5ffc069f399b",
          "name": "RUNITBOI",
          "description": "",
          "modified": "2023-12-06T13:54:37.655000",
          "created": "2023-12-06T13:54:37.655000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2591,
            "FileHash-MD5": 4089,
            "FileHash-SHA1": 2596
          },
          "indicator_count": 9276,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707d1775361e1a006d38ed",
          "name": "RUNITBOI",
          "description": "",
          "modified": "2023-12-06T13:54:31.023000",
          "created": "2023-12-06T13:54:31.023000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2591,
            "FileHash-MD5": 4089,
            "FileHash-SHA1": 2596
          },
          "indicator_count": 9276,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707cd9a34bf593b37c355a",
          "name": "yarex_vx-underground",
          "description": "",
          "modified": "2023-12-06T13:53:29.793000",
          "created": "2023-12-06T13:53:29.793000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3714,
            "FileHash-MD5": 10234,
            "hostname": 55,
            "FileHash-SHA1": 3714,
            "domain": 42,
            "YARA": 112,
            "URL": 88,
            "email": 12
          },
          "indicator_count": 17971,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "655d0de0dc5c727e740eb1d5",
          "name": "Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns - DD-923",
          "description": "Cloned of source pulse to only include hashes. See DD-923",
          "modified": "2023-11-21T20:10:09.332000",
          "created": "2023-11-21T20:06:56.960000",
          "tags": [
            "cobaltstrike",
            "apt29",
            "dark halo",
            "lnk file",
            "usaid",
            "europe",
            "malware",
            "NOBELIUM"
          ],
          "references": [
            "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
            "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
            "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
            "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
            "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
          ],
          "public": 1,
          "adversary": "APT29",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "CobaltStrike",
              "display_name": "CobaltStrike",
              "target": null
            },
            {
              "id": "FreshFire",
              "display_name": "FreshFire",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1610",
              "name": "Deploy Container",
              "display_name": "T1610 - Deploy Container"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            }
          ],
          "industries": [
            "Government",
            "NGO"
          ],
          "TLP": "white",
          "cloned_from": "60afece345be6dfd2a66ea3c",
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "avertium",
            "id": "110456",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_110456/resized/80/avatar_d318c17a31.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 42,
            "FileHash-SHA256": 74,
            "FileHash-SHA1": 62
          },
          "indicator_count": 178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 89,
          "modified_text": "879 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "645ba037bb410b24f8e36064",
          "name": "Malwarebazaar 5",
          "description": "",
          "modified": "2023-05-10T13:46:31.716000",
          "created": "2023-05-10T13:46:31.716000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LoveAndren",
            "id": "222280",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 9782,
            "FileHash-SHA1": 9782,
            "FileHash-SHA256": 50000
          },
          "indicator_count": 69564,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 42,
          "modified_text": "1074 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "637c1e47fd313a2e133afeec",
          "name": "IOC from some VT and github",
          "description": "",
          "modified": "2023-01-05T05:00:04.423000",
          "created": "2022-11-22T00:56:39.605000",
          "tags": [
            "github",
            "jump",
            "yararules",
            "sign",
            "strong",
            "view",
            "code issues",
            "pull",
            "unicode",
            "copy",
            "star",
            "open",
            "rdpwrap",
            "malware",
            "footer",
            "urls",
            "please",
            "javascript",
            "license",
            "gcti",
            "cobaltstrike",
            "without",
            "cobalt strike",
            "byval",
            "alias",
            "dllimport",
            "security",
            "false",
            "d0 add",
            "ff d5",
            "c9 xor",
            "postmessagea",
            "esp4",
            "call",
            "push",
            "c0 test",
            "f9 mov",
            "ff c0",
            "f1 jl",
            "versions",
            "ff ff",
            "d3 mov",
            "cf mov",
            "cf e8",
            "raxrbp",
            "d0 mov",
            "april",
            "format",
            "yara",
            "case",
            "sliver"
          ],
          "references": [
            "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_32bit.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_64bit.yara",
            "https://github.com/chronicle/GCTI/tree/main/YARA/CobaltStrike",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32_and_Resources_Dropper_v1_45_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32svc_Exe_v1_49_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact64_v1_49_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Beacon_Dll_All_Versions_MemEnabled.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind64_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_x64_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_x64_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_Dll_v1_49_to_v3_14_and_Sleeve_Bypassuac_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_x64_Dll_v3_3_to_v3_14_and_Sleeve_Bypassuac_x64_Dll_v4_0_and_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_Dll_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_x64_Dll_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_Dll_v2_1_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_injector_Exe_v1_44_to_v2_0_49.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Dnsstager_Bin_v1_47_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_Dll_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_X64_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_X64_Dll_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager64_Bin_v3_2_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager64_Bin_v3_2_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse64_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Smbstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Py_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Sct_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Vbs_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template__x32_x64_Ps1_v1_45_to_v2_5_and_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x64_Ps1_v3_0_to_v4_x_excluding_3_12_3_13.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x86_Vba_v3_8_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__32bit_v2_x_to_4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__64bit_v3_12_to_4_x.yara",
            "https://www.virustotal.com/gui/file/018ef51a2af287a3d665e5057e6367eb0a5d5ef5a807af6c255eba26d20b4ccf/community",
            "Axelo - vaet.com.json",
            "Axelo - Robtex.com.csv",
            "https://www.virustotal.com/gui/collection/threatfox_win_cobalt_strike",
            "ThreatFox - Raspberry Robin.stix",
            "Axelo - Stolec kradnie krypto.stix",
            "ThreatFox - BRATA.stix",
            "ThreatFox - Sliver.stix",
            "ThreatFox - RM3.stix",
            "https://github.com/bartblaze/Yara-rules/blob/master/rules/hacktools/RDPWrap.yar",
            "Axelo - Robtex.com.stix",
            "cobalt.json",
            "ThreatFox - IRATA.stix",
            "ThreatFox - Sorillus RAT.stix",
            "ThreatFox - FTCODE.stix",
            "ThreatFox - Nymaim.stix",
            "ThreatFox - Erbium Stealer.stix",
            "ThreatFox - Brute Ratel C4.stix",
            "ThreatFox - Lumma Stealer.stix",
            "ThreatFox - PrivateLoader.stix"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "nize2beme",
            "id": "215877",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1597,
            "FileHash-MD5": 397,
            "FileHash-SHA1": 396,
            "hostname": 211,
            "URL": 357,
            "domain": 376,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 3336,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 40,
          "modified_text": "1200 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "637c1e5c492aded9a7cac2ad",
          "name": "IOC from some VT and github",
          "description": "",
          "modified": "2022-12-22T00:03:52.810000",
          "created": "2022-11-22T00:57:00.259000",
          "tags": [
            "github",
            "jump",
            "yararules",
            "sign",
            "strong",
            "view",
            "code issues",
            "pull",
            "unicode",
            "copy",
            "star",
            "open",
            "rdpwrap",
            "malware",
            "footer",
            "urls",
            "please",
            "javascript",
            "license",
            "gcti",
            "cobaltstrike",
            "without",
            "cobalt strike",
            "byval",
            "alias",
            "dllimport",
            "security",
            "false",
            "d0 add",
            "ff d5",
            "c9 xor",
            "postmessagea",
            "esp4",
            "call",
            "push",
            "c0 test",
            "f9 mov",
            "ff c0",
            "f1 jl",
            "versions",
            "ff ff",
            "d3 mov",
            "cf mov",
            "cf e8",
            "raxrbp",
            "d0 mov",
            "april",
            "format",
            "yara",
            "case",
            "sliver"
          ],
          "references": [
            "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_32bit.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_64bit.yara",
            "https://github.com/chronicle/GCTI/tree/main/YARA/CobaltStrike",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32_and_Resources_Dropper_v1_45_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32svc_Exe_v1_49_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact64_v1_49_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Beacon_Dll_All_Versions_MemEnabled.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind64_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_x64_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_x64_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_Dll_v1_49_to_v3_14_and_Sleeve_Bypassuac_Dll_v4_0_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_x64_Dll_v3_3_to_v3_14_and_Sleeve_Bypassuac_x64_Dll_v4_0_and_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_Dll_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_x64_Dll_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_Dll_v2_1_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_injector_Exe_v1_44_to_v2_0_49.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Dnsstager_Bin_v1_47_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_Dll_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_X64_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_X64_Dll_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager64_Bin_v3_2_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager64_Bin_v3_2_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse64_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Smbstager_Bin_v2_5_through_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Py_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Sct_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Vbs_v3_3_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template__x32_x64_Ps1_v1_45_to_v2_5_and_v3_11_to_v3_14.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x64_Ps1_v3_0_to_v4_x_excluding_3_12_3_13.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x86_Vba_v3_8_to_v4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__32bit_v2_x_to_4_x.yara",
            "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__64bit_v3_12_to_4_x.yara",
            "https://www.virustotal.com/gui/file/018ef51a2af287a3d665e5057e6367eb0a5d5ef5a807af6c255eba26d20b4ccf/community",
            "Axelo - vaet.com.json",
            "Axelo - Robtex.com.csv",
            "https://www.virustotal.com/gui/collection/threatfox_win_cobalt_strike",
            "ThreatFox - Raspberry Robin.stix",
            "Axelo - Stolec kradnie krypto.stix",
            "ThreatFox - BRATA.stix",
            "ThreatFox - Sliver.stix",
            "ThreatFox - RM3.stix",
            "https://github.com/bartblaze/Yara-rules/blob/master/rules/hacktools/RDPWrap.yar",
            "Axelo - Robtex.com.stix",
            "cobalt.json",
            "ThreatFox - IRATA.stix",
            "ThreatFox - Sorillus RAT.stix",
            "ThreatFox - FTCODE.stix",
            "ThreatFox - Nymaim.stix",
            "ThreatFox - Erbium Stealer.stix",
            "ThreatFox - Brute Ratel C4.stix",
            "ThreatFox - Lumma Stealer.stix",
            "ThreatFox - PrivateLoader.stix"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "nize2beme",
            "id": "215877",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1589,
            "FileHash-MD5": 396,
            "FileHash-SHA1": 395,
            "hostname": 211,
            "URL": 357,
            "domain": 376
          },
          "indicator_count": 3324,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 39,
          "modified_text": "1214 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044f05de2645f549157cb",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:48:00.965000",
          "created": "2022-07-26T19:48:00.965000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 41,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044d5f7b949b112c408b6",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:33.731000",
          "created": "2022-07-26T19:47:33.731000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 39,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044ced52e9728a1ef19a1",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:26.198000",
          "created": "2022-07-26T19:47:26.198000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 38,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044cd91ca3ab5ff206348",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:25.850000",
          "created": "2022-07-26T19:47:25.850000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 38,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044cd6946f32148d33f1f",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:25.114000",
          "created": "2022-07-26T19:47:25.114000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044cc5edcc0364bbf9f03",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:24.272000",
          "created": "2022-07-26T19:47:24.272000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e044c447c59b2b2f34a209",
          "name": "muestra",
          "description": "iocs reales",
          "modified": "2022-07-26T19:47:16.154000",
          "created": "2022-07-26T19:47:16.154000",
          "tags": [
            "known malicious",
            "high",
            "true filesha256",
            "true filesha1",
            "medium",
            "true filemd5",
            "revisar correo",
            "malware",
            "iocs",
            "raas",
            "ransomware",
            "black basta",
            "ultimasms",
            "emotet",
            "powershell",
            "trickbot",
            "cobaltstrike",
            "cobalt",
            "avemariarat",
            "bitrat",
            "infostealer",
            "phishing",
            "malicious",
            "qakbot",
            "mimikatz",
            "cobalt strike",
            "cain",
            "installer",
            "execution",
            "persistence",
            "quasar",
            "mexico",
            "arguepatch",
            "caddywiper",
            "industroyer2"
          ],
          "references": [
            "CustomTiIndicators.20220726.191851.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mdrsoc_secnesys",
            "id": "201645",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1857,
            "FileHash-SHA1": 1918,
            "FileHash-SHA256": 3744,
            "domain": 1,
            "email": 2
          },
          "indicator_count": 7522,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "1362 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220504759fbecf37ab5c723",
          "name": "TL - ACSC Feb 2022-02 IOCs updated",
          "description": "",
          "modified": "2022-04-02T00:04:50.405000",
          "created": "2022-03-03T05:21:11.204000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tl-defenceshield",
            "id": "86119",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 12,
            "FileHash-SHA1": 11,
            "FileHash-SHA256": 19,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 48,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 27,
          "modified_text": "1478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "61ea34c6808f9758bc050bdf",
          "name": "yarex_vx-underground",
          "description": "yarex/vx-underground\n\nhttps://github.com/resteex0/yarex",
          "modified": "2022-02-20T00:05:37.403000",
          "created": "2022-01-21T04:21:26.478000",
          "tags": [
            "vx_underground2_shinolocker",
            "compat",
            "yara rule",
            "set author",
            "identifier",
            "rule set",
            "group",
            "acenqvzzceiow",
            "yvvsrpmljigecb",
            "hhjhlln",
            "pprpttvpxxzx",
            "nblockuse",
            "dbcsbuffer",
            "clsid",
            "chartable",
            "callout",
            "rcscript",
            "wow64",
            "inprocserver32",
            "device",
            "getmodel",
            "ctokenbase",
            "ueba",
            "pchunter",
            "wl5pllp",
            "l56a21wl5",
            "bdglp",
            "mao5dpswl5",
            "rule",
            "cryptopp",
            "concurrency",
            "window position",
            "floating",
            "oici",
            "beilosvy",
            "ole automation",
            "typeapplication",
            "hmaf",
            "pfvfkcrbi",
            "jnvxyc",
            "ycmazdnb",
            "myob",
            "moon",
            "fnrtvx85p",
            "otherfilezilla",
            "storageleveldb",
            "left",
            "right",
            "mssqlfdlauncher",
            "profxengagement",
            "sbsmonitoring",
            "sharepoint",
            "systembgc",
            "gettags",
            "findallcore",
            "getenumerator",
            "createchildren",
            "dropdownglyph",
            "xfnpzpwm1",
            "publickey",
            "flatedecode",
            "accd",
            "xwys",
            "olceofgigjclm",
            "zzyuqrst",
            "ccomcoclass",
            "vcperfbar",
            "clsidperfbar",
            "b8b4b0b",
            "e11e",
            "ajijqjnajij",
            "pluginshortname",
            "progid",
            "setnodevalue",
            "null",
            "brfighter",
            "imesentencemode",
            "winnt",
            "static",
            "init",
            "contacto",
            "ppaa",
            "lkkdpvvyk",
            "fxhqsosrrw",
            "fcgttgu",
            "namespace3http",
            "cbdbeb",
            "darkgreen",
            "ausername",
            "ryfagccx",
            "systemfolder",
            "powershell",
            "updateprogress",
            "ueaaxhh",
            "programs",
            "ekndxkijjubn",
            "ety4ev2",
            "mws11sr",
            "vwwm6m3sv6n",
            "ktmp",
            "see http",
            "voisrtjiosd",
            "vrotumvolitg",
            "40432",
            "imowwwg",
            "hyperlink http",
            "a80do68ncfmhg",
            "clmpprev",
            "dimpprev",
            "enmpprev",
            "enmpstop",
            "dwdscrange1",
            "abbschevis",
            "timestamp",
            "cottleakela",
            "installer",
            "lastcpu",
            "abcbc",
            "adddedededefg",
            "oqsuwy",
            "acegikmprtvxz",
            "bcfghklpstuwx",
            "o3o5o7o9o",
            "yy0y3y5y6y",
            "ycyfyrysyyy",
            "zlib",
            "makemirror",
            "decimal",
            "word",
            "asiasamarkand",
            "direct",
            "cgpointdd",
            "currentreq",
            "base",
            "cgrect",
            "cgsizedd",
            "ljavalangstring",
            "installeragent",
            "blockinvoke",
            "appdelegate",
            "finishmsg",
            "djdea",
            "aomkjinl1",
            "zyvffbe",
            "eefhibcliff",
            "programfiles",
            "ainfbf",
            "qxyl",
            "dhldtdbcagmst",
            "oktxtdtrsqw",
            "adope player",
            "nodeset",
            "abijopqruvyz",
            "attribute",
            "instnop",
            "atomicinc",
            "y61y",
            "system",
            "generics",
            "collections",
            "classes",
            "controls",
            "graphics",
            "tlisthelper",
            "types",
            "winapi",
            "forms",
            "write",
            "insert",
            "getclass",
            "first",
            "next",
            "copy",
            "keepalive",
            "find",
            "error",
            "comp",
            "capturecallback",
            "statecallback",
            "innerlayout",
            "filesexcalibur",
            "http",
            "iaomaomark1",
            "wandevice1",
            "itkgroih",
            "dggcmpxzm",
            "mzmz",
            "eeizqafngzeiagf",
            "radioitem",
            "oiaooim",
            "formatul",
            "2izvpg",
            "linkid316963",
            "linkid316964",
            "linkid316967",
            "edqppoyx",
            "tvalue",
            "antimalware",
            "programdata",
            "stringfileinfo",
            "y1y01y2y1y",
            "class",
            "oniowrite",
            "wsasend",
            "allocate",
            "datadefault",
            "startiocpserver",
            "changeicon",
            "username",
            "ihjhkhlhmh",
            "azaz09",
            "windowssystem32",
            "windows",
            "dvfa",
            "kwloyj",
            "windir",
            "dosdevicesc",
            "rlkajrv",
            "qwla",
            "ghgpgxg",
            "searchterms",
            "bonjo",
            "closehandle",
            "iixitipilihidi",
            "iixipihi",
            "i8i0i",
            "01236575988",
            "qasctdufzh",
            "kmndresnxzy",
            "edfdsrwv",
            "zmtdw",
            "dqax45ogfmwrp",
            "t125jhba",
            "wuy0859lnru",
            "r5jhpa",
            "fabdwkmnnlekf",
            "sha512",
            "keyid",
            "chromiumuser",
            "slimjetuser",
            "clmpstop",
            "acedeceiver",
            "launch",
            "file2dev",
            "filemgr",
            "qaehaav",
            "agenttesla",
            "data source",
            "amavaldo",
            "amavaldo group",
            "submitnextfile",
            "aname",
            "aparam",
            "iwtop",
            "path",
            "vendorlib",
            "ljavalangstr",
            "androidpsiphone",
            "google play",
            "cffww",
            "androidxavier",
            "agnrzz",
            "ywspkg",
            "feimkjijhd",
            "01569",
            "beda",
            "noon",
            "andromeda",
            "andromeda group",
            "asyncrat",
            "asyncrat group",
            "ursa",
            "vsha1",
            "tfss",
            "upkcs1v15",
            "clonableimpl",
            "algorithmimpl",
            "iteratedhash",
            "enumtotype",
            "w4byteorder",
            "atomsilo",
            "data",
            "state",
            "avemaria",
            "avemaria group",
            "server",
            "serveraddins",
            "redirector",
            "azorult",
            "azorult group"
          ],
          "references": [
            "Azorult.yar",
            "Ave Maria.yar",
            "AtomSilo.yar",
            "AsyncRAT.yar",
            "Andromeda.yar",
            "Android.Xavier.yar",
            "Android.Psiphone.yar",
            "Android.Hummingbad.yar",
            "Amavaldo.yar",
            "AgentTesla.yar",
            "AceDeceiver.yar",
            "Zumanek.yar",
            "Zeus.yar",
            "YanluowangRansomware.yar",
            "XFilesStealer.yar",
            "Werdlod.yar",
            "Virlock.yar",
            "Vermin.yar",
            "Valyria.yar",
            "TrickGate.yar",
            "Tor2Mine.yar",
            "Tinba.yar",
            "TeslaCrypt.yar",
            "Stegoloader.yar",
            "Stantinko.yar",
            "SnakeKeylogger.yar",
            "SmokeLoader.yar",
            "SkypeWorm.yar",
            "Skype Worm.yar",
            "Siloscape.yar",
            "ShinoLocker.yar",
            "ShimRAT.yar",
            "Shell Crew.yar",
            "Sanya.yar",
            "Samsam Ransomware.yar",
            "Sakula.yar",
            "RokRAT.yar",
            "Remcos.yar",
            "RedLine.yar",
            "Reaver.yar",
            "Razy.yar",
            "RawPOS.yar",
            "Ramdo.yar",
            "RaccoonStealer.yar",
            "QuasarRAT.yar",
            "Pysa.yar",
            "Pushdo.yar",
            "Punkey.yar",
            "ProjectSauron.yar",
            "Powersniff.yar",
            "Poseidon.yar",
            "Pony.yar",
            "PlugX.yar",
            "PlatinumGroup.yar",
            "PIVY.yar",
            "Phorpiex.yar",
            "Pegasus.yar",
            "PassCV.yar",
            "Oscorp.yar",
            "Ohagi.yar",
            "NvRendererMiner.yar",
            "Numando.yar",
            "NjRat.yar",
            "NitlovePOS.yar",
            "NetWire RAT.yar",
            "NetFilter.yar",
            "Necro.yar",
            "Nanocore.yar",
            "Nanhaishu.yar",
            "MosesStaff.yar",
            "Molerats.yar",
            "MNKit.yar",
            "Mirai.yar",
            "Medusa Locker.yar",
            "MassLogger.yar",
            "Magnat.yar",
            "MacOS.Zuru.yar",
            "MacOS.XCSSET.yar",
            "MacOS.Tarmac.yar",
            "MacOS.Shlayer.yar",
            "MacOS.Pirrit.yar",
            "MacOS.Macma.yar",
            "MacOS.LaoShu.yar",
            "MacOS.Kitm.yar",
            "MacOS.KeRanger.yar",
            "MacOS.Dummy.yar",
            "MacOS.Convuster.yar",
            "MacOS.Cointicker.yar",
            "MacOS.Calisto.yar",
            "MacOS.BirdMiner.yar",
            "MacOS.AdLoad.yar",
            "Lokibot.yar",
            "Loda RAT.yar",
            "Locky Ransomware.yar",
            "LockerGoga.yar",
            "Linux.Spike.yar",
            "LeetMX.yar",
            "Kriptovor.yar",
            "KRBanker.yar",
            "Keybase.yar",
            "Jupyter.yar",
            "JSocket.yar",
            "ImminentMonitor.yar",
            "HawkEye Keylogger.yar",
            "HaronRansomware.yar",
            "GuLoader.yar",
            "GriftHorse.yar",
            "Grief.yar",
            "GoSearch.yar",
            "Glupteba.yar",
            "GlobeImposterRansomware.yar",
            "Gauss.yar",
            "FritzFrog.yar",
            "FormBook.yar",
            "Filmkan.yar",
            "FighterPOS.yar",
            "Fareit.yar",
            "FakeDivX.yar",
            "Exaramel.yar",
            "Escelar.yar",
            "Emotet.yar",
            "Emdivi.yar",
            "Elirks.yar",
            "Dyre.yar",
            "DnSpyTrojan.yar",
            "Djvu.yar",
            "DiavolRansomware.yar",
            "DecafRansomware.yar",
            "DearCry Ransomware.yar",
            "DCRat.yar",
            "Daserf.yar",
            "DarkVNC.yar",
            "Darkside.yar",
            "DanaBot.yar",
            "CVE-2017-11882.yar",
            "CVE-2017-10271.yar",
            "Curator Ransomware.yar",
            "CubaRansomware.yar",
            "CryptoFortress.yar",
            "CryptBot.yar",
            "Conti.yar",
            "Coinvault.yar",
            "CobaltStrike.yar",
            "Cobalt Strike.yar",
            "Clownic Ransomware.yar",
            "Chapak.yar",
            "CertBreaker.yar",
            "CerberRansomware.yar",
            "BotenaGo.yar",
            "Blackhole EK.yar",
            "Bizarro.yar",
            "BitRAT.yar",
            "Bedep.yar",
            "BasBanke.yar",
            "Bartalex.yar",
            "Banload.yar",
            "BandarChor Ransomware.yar",
            "Babuk.yar",
            "Babadeda.yar"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "vx_underground2_ShinoLocker",
              "display_name": "vx_underground2_ShinoLocker",
              "target": null
            },
            {
              "id": "Compat",
              "display_name": "Compat",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1024",
              "name": "Custom Cryptographic Protocol",
              "display_name": "T1024 - Custom Cryptographic Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "resteex0",
            "id": "175858",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 10234,
            "FileHash-SHA1": 3714,
            "FileHash-SHA256": 3714,
            "YARA": 151,
            "domain": 42,
            "hostname": 55,
            "URL": 88,
            "email": 12
          },
          "indicator_count": 18010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1519 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "61efac68c4197adfaa46649d",
          "name": "RUNITBOI",
          "description": "Test 1",
          "modified": "2022-01-25T07:53:12.508000",
          "created": "2022-01-25T07:53:12.508000",
          "tags": [],
          "references": [
            "60ae09552e0eaac5c0861ab4.txt",
            "60afabc561644068d15f3a54.txt",
            "60afb8e03c357e7597507757.txt",
            "60afd2d5ce95a296d0f9323e.txt",
            "60af6e488de8bc838892a75e.txt",
            "60b0b9c71621a0149fd3bc07.txt",
            "60afece345be6dfd2a66ea3c.txt",
            "60b7a5d658786519b7e5e9dc.txt",
            "60b8a178a6e813e88be3181b.txt",
            "60b0cd1697da17aefe01db85.txt",
            "60b8bbf9744408d3a83062f7.txt",
            "60b9ca2c4ba7e11e71060c4c.txt",
            "60b64ba03137e59e5c2fec77.txt",
            "60ae4abdf56c57022a34ca1a.txt",
            "60afb5e9fc9ead03c5f4ca2d.txt",
            "60b89765d9d4209af982cf7c.txt",
            "60b689c652cd41240e77cfbe.txt",
            "60ba4f741e3b2b85285b0bb5.txt",
            "60bdfb172c85862f931deced.txt",
            "60be1d277d109b2b37060c4c.txt",
            "60be3e3f6ba2c7d1bec747a2.txt",
            "60be05932c2ce1ef655b0bb5.txt",
            "60be30837c3f13bb72131f36.txt",
            "60ae0cfbbabd2c9a40d9a2c2.txt",
            "60c0c49d876c2e8d6429cd71.txt",
            "60bf9746b81c47f6658b7e1a.txt",
            "60c1d1c38a092f05e2faa786.txt",
            "60c1c9c738e6f7877568a75e.txt",
            "60c1bd0453d20003e473d335.txt",
            "60c8b7f02d52c1f5cbaaef96.txt",
            "60c9e28af992867603a7763f.txt",
            "60c86d50c9ac3534790487d5.txt",
            "60c088d3fd6e59ee86c1b78b.txt",
            "60c341dc8964edd2e2fcb651.txt",
            "60c23b8ce911becad33c4829.txt",
            "60ca189478da06f3f78160b5.txt",
            "60c34510bd6707ce53355efc.txt",
            "60cb6b6e22caa5b8857044af.txt",
            "60caff34051d70ff641c84d7.txt",
            "60cb30e9d2fc165db7083874.txt",
            "60cb37bf5fe8246bb2556969.txt",
            "60cb0868a8196a64861c84d7.txt",
            "60cb66ed91d51ab92ec3535f.txt",
            "60d0aaf6060a9c3b804a4d0c.txt",
            "60d0afbc395c24edefb33bb9.txt",
            "60cc709013f5498fe7e60120.txt",
            "60d2f6ee92c20710aad95809.txt",
            "60d9aedbe0ea24a870fd26c7.txt",
            "60d1b021668edffa00a03423.txt",
            "60d9b897ad9b12583b784ae7.txt",
            "60d2f18dfd693f4314446f84.txt",
            "60d9e9095f98a9600641d921.txt",
            "60c31c4e4978e9721446c121.txt",
            "60d48bbcfde9f64a34361a14.txt",
            "60d9ec0c972304a313b416b3.txt",
            "60d58e305f20d7e67d3aff3b.txt",
            "60d04622f95b5aa9f78bf577.txt",
            "60d344aae66268d9b2a55c3a.txt",
            "60da2c80aa5400db8f1561d5.txt",
            "60d584d46294b971bc361a14.txt",
            "60db5d29be7b348bae7da15f.txt",
            "60d497443a1d73f8622132cc.txt",
            "60dd70ecf3795ef2a7fd26c7.txt",
            "60dc81564829a831b27da15f.txt",
            "60df03f767571cacb82a5f53.txt",
            "60d9e694cf4ac84aec30c7e6.txt",
            "60df026b54737eb1c5a3dc70.txt",
            "60e02f9e498dfdf25caf7753.txt",
            "60e5a00ab56614eff266ef0b.txt",
            "60db027b309038564ad88c9f.txt",
            "60e5a6d969b07b864b061d92.txt",
            "60e6ca542cd6b730d5500085.txt",
            "60ddbf90b3211a60e87da15f.txt",
            "60df059aa243861016a3dc70.txt",
            "60e81a24e8d59fbc73500085.txt",
            "60e6c811e797f56de6d1689a.txt",
            "60e6d2a6786d43397db19bc7.txt",
            "60e814a5c824808f12b19bc7.txt",
            "60e82e4eed04e618467d80d2.txt",
            "60e81bf2c570f26603d0c408.txt",
            "60e8316fd31a207cde500085.txt",
            "60ebfd6c98d851026cd2505d.txt",
            "60ec201a77a3b44bdfa65b4d.txt",
            "60ec2a9f558af4c0bfe16a46.txt",
            "60eeb8b1f8a87529ba8d6d8c.txt",
            "60eec5891dc74a982170a512.txt",
            "60ed75c6b350c56aaa7b2574.txt",
            "60efe4047c9b9b9564314643.txt",
            "60eff240c7c9cb4f24907049.txt",
            "60f01d8cfe51e550951c8023.txt",
            "60f05cb87f7c642309de71ef.txt",
            "60f02d70854fe24789907049.txt",
            "60f7eaafe05663ddea26b1b5.txt",
            "60f07bbde76ba1899ade71ef.txt",
            "60ec06ea60906a8a9c69cf23.txt",
            "60f7f55ab4b22e92326a3f0e.txt",
            "60f69abe78efabfdc725eb5e.txt",
            "60f54edc2f628190f573717b.txt",
            "60f000072f3b86f765907049.txt",
            "60f92ab428e945a165d2f0d9.txt",
            "60f676ce7abde68cd3dc5ede.txt",
            "60f93f3cc50f9e04d926b1b5.txt",
            "60f694ae9a2e2533cb900d55.txt",
            "60f930c9c1a69acdb28adea6.txt",
            "60f0059134f2d6364de00c85.txt",
            "60f1357c15569fb2a28d6d8d.txt",
            "60f94199d6a38e9d93f50339.txt",
            "60f597533e911956a673717b.txt",
            "60f1832853d980c86f70a513.txt",
            "60fadfc16251d4a50ff50339.txt",
            "60fe86d13f897a5311f50339.txt",
            "60f12a9bc1e8763fef70a512.txt",
            "61a4f833001372795ade9530.txt",
            "60ffcd56a7dc0038376fe52e.txt",
            "61a4fb7c9b88f16b103c151d.txt",
            "61a4fea45999d467dfe004e7.txt",
            "61a7a4ab87dda2ec4c035c7e.txt",
            "61a8d385e77cc0c52c73069c.txt",
            "60f6a2cbd3661acc8a43eb28.txt",
            "61a8dfe2a333faf90e50f7b3.txt",
            "61a64eccb0e65ef59a57e5d4.txt",
            "61a65236f6ac8afd687892c6.txt",
            "61af3c4cd10c07193a7c54e2.txt",
            "61af93b30f8cd95e3deede67.txt",
            "61af436c8de74c0a6c9d117c.txt",
            "61b8b4b348dfed61dd98e394.txt",
            "61b75c2915050cf6e811fef9.txt",
            "61b8b6a666a6707ae9ccce49.txt",
            "60fa8321254ba0501adc5ede.txt",
            "61b77e54cc69421a2fe7ca30.txt",
            "61b207a3724c6259ec7d78e9.txt",
            "60f82394e6c1b7c6ec7b9978.txt",
            "61b774d6e85500828664f9e9.txt",
            "61b864ed5388614b699a858a.txt",
            "61b2237176a72463836e24fe.txt",
            "61b2290ee7cb4628d56979d5.txt",
            "61ba1e66f9edc63a27ce0100.txt",
            "61bc97b3387f34a50e15fd38.txt",
            "61b7707ea83c68d70d893db9.txt",
            "61b886db3f57da33ac504548.txt",
            "61bca21cf212a6842e17c00b.txt",
            "61bb31bceb547f7142333d49.txt",
            "61c1c02691a6120724220e4e.txt",
            "61c5a0f6b228644655962c31.txt",
            "61c5ae2eaf98244960cff47a.txt",
            "61c9aff8d72c2a4731021bee.txt",
            "61c19d40e4243f84e1d54891.txt",
            "61c078ca8294b0d42f4c2b6e.txt",
            "61c327ab3c1ce914f02ef526.txt",
            "61caf93b1c17a0fbcc724692.txt",
            "61c9a1f535cfaffb92279bc1.txt",
            "61cdba240cd1f98f6a1e138f.txt",
            "61d2f8fad0b6469cf1b4aa56.txt",
            "61c9d383c93ed2a56b46ffd2.txt",
            "61d41cf8b01ad37efdf21081.txt",
            "61d85b5006fdef2345a10363.txt",
            "61d5b8c1174648df18ff2c24.txt",
            "61cd9f294cca4dfa82461445.txt",
            "61dc1f38a5b5b90adf7775d0.txt",
            "61d462688b564edb5e8bbaad.txt",
            "61dc3d0b1af759e6a8868d20.txt",
            "61d590f57f137aee980ab4aa.txt",
            "61dea43f2151cf47ba7fed44.txt",
            "61dd6333c3a0bac56296dd37.txt",
            "61dfe35d4ffb7b92b8c2cf93.txt",
            "61e6e07fe17676b3e61f7052.txt",
            "61e9290cfb0531e85d086579.txt",
            "61e59f497022f0fb28114f96.txt",
            "61ea8f0fe72ea3d1783f483a.txt",
            "61ea84ddcfa8b73320e779df.txt",
            "61ea88bbc174f5e9cd25de67.txt",
            "61ea997d233aa9f7a13e2c4a.txt",
            "61ea977759cc28216fa93688.txt",
            "61e039354995bacf49e507ad.txt",
            "61ee85024b3758a4a953a386.txt",
            "601ad65bb1f0c3f6116d20ab.txt",
            "601c62e85ef2f3b4f83bb6db.txt",
            "61d81f95eecd468222f85464.txt",
            "601c299359e0682c185cf686.txt",
            "601aedb7c7c215c1dc3bb6db.txt",
            "601d829edc72a52a03fea3a7.txt",
            "601da173ed7d3e7e31c67c3d.txt",
            "602beffabc1975c22c394912.txt",
            "602d3c9c7078054d4492c9a2.txt",
            "602d5044d7b695af9c39ce5f.txt",
            "602d71551b7f59ad26f84d23.txt",
            "602dd49091c952fc7bf4464c.txt",
            "602ecfb40524de16ef1b6fa3.txt",
            "601da88ef3497825aaee8aaa.txt",
            "602fe5ca7a06b19f5d3bcdeb.txt",
            "602ebc6fe4fa4f06f6772f11.txt",
            "602fe96189be26708dfafe17.txt",
            "603d19ff5e6680fa73bbf7b3.txt",
            "603d10bdb7248018661ef46c.txt",
            "602fe5463185aba3fb999b4e.txt",
            "61a79adb823719a2ddf8a0b4.txt",
            "603eb1abdd4812819c64e197.txt",
            "603ff1e9027d1641595b83d4.txt",
            "603fd483e52dabf8b0e6223d.txt",
            "604a4749fc9870e26292768f.txt",
            "604b87040f5726e9ef553290.txt",
            "604a40993962cb029d4ee31a.txt",
            "604bcd7fe31c2632fb89a994.txt",
            "604be1f1b3e7d2d69304b680.txt",
            "604b990ff0abcadfb2e0efec.txt",
            "605b75b82d3c11af9e907851.txt",
            "605caf0881cf2953063d2fab.txt",
            "605e06522f4f0a6e847a3dfa.txt",
            "604a6afc039ed6501b26792c.txt",
            "606c9900cc9dabf9542b6d8d.txt",
            "606cb1ee2db0eb990bdb1227.txt",
            "606dd51193fe95bf9552902e.txt",
            "606ca0c67abdf143edcc4c43.txt",
            "606dfd9079e30b337044cdaf.txt",
            "606f64e067a0d01c604aa847.txt",
            "606f347aadebd8f4dd043ac9.txt",
            "606f3b451543aa3bbf378a52.txt",
            "606f5973a214488ae57f0f15.txt",
            "607c4b5060122d7ff114c044.txt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "yalikeit",
            "id": "141710",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4089,
            "FileHash-SHA1": 2596,
            "FileHash-SHA256": 2591
          },
          "indicator_count": 9276,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 40,
          "modified_text": "1545 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        },
        {
          "id": "61efac65406645f36af71820",
          "name": "RUNITBOI",
          "description": "",
          "modified": "2022-01-25T07:53:09.798000",
          "created": "2022-01-25T07:53:09.798000",
          "tags": [],
          "references": [
            "60ae09552e0eaac5c0861ab4.txt",
            "60afabc561644068d15f3a54.txt",
            "60afb8e03c357e7597507757.txt",
            "60afd2d5ce95a296d0f9323e.txt",
            "60af6e488de8bc838892a75e.txt",
            "60b0b9c71621a0149fd3bc07.txt",
            "60afece345be6dfd2a66ea3c.txt",
            "60b7a5d658786519b7e5e9dc.txt",
            "60b8a178a6e813e88be3181b.txt",
            "60b0cd1697da17aefe01db85.txt",
            "60b8bbf9744408d3a83062f7.txt",
            "60b9ca2c4ba7e11e71060c4c.txt",
            "60b64ba03137e59e5c2fec77.txt",
            "60ae4abdf56c57022a34ca1a.txt",
            "60afb5e9fc9ead03c5f4ca2d.txt",
            "60b89765d9d4209af982cf7c.txt",
            "60b689c652cd41240e77cfbe.txt",
            "60ba4f741e3b2b85285b0bb5.txt",
            "60bdfb172c85862f931deced.txt",
            "60be1d277d109b2b37060c4c.txt",
            "60be3e3f6ba2c7d1bec747a2.txt",
            "60be05932c2ce1ef655b0bb5.txt",
            "60be30837c3f13bb72131f36.txt",
            "60ae0cfbbabd2c9a40d9a2c2.txt",
            "60c0c49d876c2e8d6429cd71.txt",
            "60bf9746b81c47f6658b7e1a.txt",
            "60c1d1c38a092f05e2faa786.txt",
            "60c1c9c738e6f7877568a75e.txt",
            "60c1bd0453d20003e473d335.txt",
            "60c8b7f02d52c1f5cbaaef96.txt",
            "60c9e28af992867603a7763f.txt",
            "60c86d50c9ac3534790487d5.txt",
            "60c088d3fd6e59ee86c1b78b.txt",
            "60c341dc8964edd2e2fcb651.txt",
            "60c23b8ce911becad33c4829.txt",
            "60ca189478da06f3f78160b5.txt",
            "60c34510bd6707ce53355efc.txt",
            "60cb6b6e22caa5b8857044af.txt",
            "60caff34051d70ff641c84d7.txt",
            "60cb30e9d2fc165db7083874.txt",
            "60cb37bf5fe8246bb2556969.txt",
            "60cb0868a8196a64861c84d7.txt",
            "60cb66ed91d51ab92ec3535f.txt",
            "60d0aaf6060a9c3b804a4d0c.txt",
            "60d0afbc395c24edefb33bb9.txt",
            "60cc709013f5498fe7e60120.txt",
            "60d2f6ee92c20710aad95809.txt",
            "60d9aedbe0ea24a870fd26c7.txt",
            "60d1b021668edffa00a03423.txt",
            "60d9b897ad9b12583b784ae7.txt",
            "60d2f18dfd693f4314446f84.txt",
            "60d9e9095f98a9600641d921.txt",
            "60c31c4e4978e9721446c121.txt",
            "60d48bbcfde9f64a34361a14.txt",
            "60d9ec0c972304a313b416b3.txt",
            "60d58e305f20d7e67d3aff3b.txt",
            "60d04622f95b5aa9f78bf577.txt",
            "60d344aae66268d9b2a55c3a.txt",
            "60da2c80aa5400db8f1561d5.txt",
            "60d584d46294b971bc361a14.txt",
            "60db5d29be7b348bae7da15f.txt",
            "60d497443a1d73f8622132cc.txt",
            "60dd70ecf3795ef2a7fd26c7.txt",
            "60dc81564829a831b27da15f.txt",
            "60df03f767571cacb82a5f53.txt",
            "60d9e694cf4ac84aec30c7e6.txt",
            "60df026b54737eb1c5a3dc70.txt",
            "60e02f9e498dfdf25caf7753.txt",
            "60e5a00ab56614eff266ef0b.txt",
            "60db027b309038564ad88c9f.txt",
            "60e5a6d969b07b864b061d92.txt",
            "60e6ca542cd6b730d5500085.txt",
            "60ddbf90b3211a60e87da15f.txt",
            "60df059aa243861016a3dc70.txt",
            "60e81a24e8d59fbc73500085.txt",
            "60e6c811e797f56de6d1689a.txt",
            "60e6d2a6786d43397db19bc7.txt",
            "60e814a5c824808f12b19bc7.txt",
            "60e82e4eed04e618467d80d2.txt",
            "60e81bf2c570f26603d0c408.txt",
            "60e8316fd31a207cde500085.txt",
            "60ebfd6c98d851026cd2505d.txt",
            "60ec201a77a3b44bdfa65b4d.txt",
            "60ec2a9f558af4c0bfe16a46.txt",
            "60eeb8b1f8a87529ba8d6d8c.txt",
            "60eec5891dc74a982170a512.txt",
            "60ed75c6b350c56aaa7b2574.txt",
            "60efe4047c9b9b9564314643.txt",
            "60eff240c7c9cb4f24907049.txt",
            "60f01d8cfe51e550951c8023.txt",
            "60f05cb87f7c642309de71ef.txt",
            "60f02d70854fe24789907049.txt",
            "60f7eaafe05663ddea26b1b5.txt",
            "60f07bbde76ba1899ade71ef.txt",
            "60ec06ea60906a8a9c69cf23.txt",
            "60f7f55ab4b22e92326a3f0e.txt",
            "60f69abe78efabfdc725eb5e.txt",
            "60f54edc2f628190f573717b.txt",
            "60f000072f3b86f765907049.txt",
            "60f92ab428e945a165d2f0d9.txt",
            "60f676ce7abde68cd3dc5ede.txt",
            "60f93f3cc50f9e04d926b1b5.txt",
            "60f694ae9a2e2533cb900d55.txt",
            "60f930c9c1a69acdb28adea6.txt",
            "60f0059134f2d6364de00c85.txt",
            "60f1357c15569fb2a28d6d8d.txt",
            "60f94199d6a38e9d93f50339.txt",
            "60f597533e911956a673717b.txt",
            "60f1832853d980c86f70a513.txt",
            "60fadfc16251d4a50ff50339.txt",
            "60fe86d13f897a5311f50339.txt",
            "60f12a9bc1e8763fef70a512.txt",
            "61a4f833001372795ade9530.txt",
            "60ffcd56a7dc0038376fe52e.txt",
            "61a4fb7c9b88f16b103c151d.txt",
            "61a4fea45999d467dfe004e7.txt",
            "61a7a4ab87dda2ec4c035c7e.txt",
            "61a8d385e77cc0c52c73069c.txt",
            "60f6a2cbd3661acc8a43eb28.txt",
            "61a8dfe2a333faf90e50f7b3.txt",
            "61a64eccb0e65ef59a57e5d4.txt",
            "61a65236f6ac8afd687892c6.txt",
            "61af3c4cd10c07193a7c54e2.txt",
            "61af93b30f8cd95e3deede67.txt",
            "61af436c8de74c0a6c9d117c.txt",
            "61b8b4b348dfed61dd98e394.txt",
            "61b75c2915050cf6e811fef9.txt",
            "61b8b6a666a6707ae9ccce49.txt",
            "60fa8321254ba0501adc5ede.txt",
            "61b77e54cc69421a2fe7ca30.txt",
            "61b207a3724c6259ec7d78e9.txt",
            "60f82394e6c1b7c6ec7b9978.txt",
            "61b774d6e85500828664f9e9.txt",
            "61b864ed5388614b699a858a.txt",
            "61b2237176a72463836e24fe.txt",
            "61b2290ee7cb4628d56979d5.txt",
            "61ba1e66f9edc63a27ce0100.txt",
            "61bc97b3387f34a50e15fd38.txt",
            "61b7707ea83c68d70d893db9.txt",
            "61b886db3f57da33ac504548.txt",
            "61bca21cf212a6842e17c00b.txt",
            "61bb31bceb547f7142333d49.txt",
            "61c1c02691a6120724220e4e.txt",
            "61c5a0f6b228644655962c31.txt",
            "61c5ae2eaf98244960cff47a.txt",
            "61c9aff8d72c2a4731021bee.txt",
            "61c19d40e4243f84e1d54891.txt",
            "61c078ca8294b0d42f4c2b6e.txt",
            "61c327ab3c1ce914f02ef526.txt",
            "61caf93b1c17a0fbcc724692.txt",
            "61c9a1f535cfaffb92279bc1.txt",
            "61cdba240cd1f98f6a1e138f.txt",
            "61d2f8fad0b6469cf1b4aa56.txt",
            "61c9d383c93ed2a56b46ffd2.txt",
            "61d41cf8b01ad37efdf21081.txt",
            "61d85b5006fdef2345a10363.txt",
            "61d5b8c1174648df18ff2c24.txt",
            "61cd9f294cca4dfa82461445.txt",
            "61dc1f38a5b5b90adf7775d0.txt",
            "61d462688b564edb5e8bbaad.txt",
            "61dc3d0b1af759e6a8868d20.txt",
            "61d590f57f137aee980ab4aa.txt",
            "61dea43f2151cf47ba7fed44.txt",
            "61dd6333c3a0bac56296dd37.txt",
            "61dfe35d4ffb7b92b8c2cf93.txt",
            "61e6e07fe17676b3e61f7052.txt",
            "61e9290cfb0531e85d086579.txt",
            "61e59f497022f0fb28114f96.txt",
            "61ea8f0fe72ea3d1783f483a.txt",
            "61ea84ddcfa8b73320e779df.txt",
            "61ea88bbc174f5e9cd25de67.txt",
            "61ea997d233aa9f7a13e2c4a.txt",
            "61ea977759cc28216fa93688.txt",
            "61e039354995bacf49e507ad.txt",
            "61ee85024b3758a4a953a386.txt",
            "601ad65bb1f0c3f6116d20ab.txt",
            "601c62e85ef2f3b4f83bb6db.txt",
            "61d81f95eecd468222f85464.txt",
            "601c299359e0682c185cf686.txt",
            "601aedb7c7c215c1dc3bb6db.txt",
            "601d829edc72a52a03fea3a7.txt",
            "601da173ed7d3e7e31c67c3d.txt",
            "602beffabc1975c22c394912.txt",
            "602d3c9c7078054d4492c9a2.txt",
            "602d5044d7b695af9c39ce5f.txt",
            "602d71551b7f59ad26f84d23.txt",
            "602dd49091c952fc7bf4464c.txt",
            "602ecfb40524de16ef1b6fa3.txt",
            "601da88ef3497825aaee8aaa.txt",
            "602fe5ca7a06b19f5d3bcdeb.txt",
            "602ebc6fe4fa4f06f6772f11.txt",
            "602fe96189be26708dfafe17.txt",
            "603d19ff5e6680fa73bbf7b3.txt",
            "603d10bdb7248018661ef46c.txt",
            "602fe5463185aba3fb999b4e.txt",
            "61a79adb823719a2ddf8a0b4.txt",
            "603eb1abdd4812819c64e197.txt",
            "603ff1e9027d1641595b83d4.txt",
            "603fd483e52dabf8b0e6223d.txt",
            "604a4749fc9870e26292768f.txt",
            "604b87040f5726e9ef553290.txt",
            "604a40993962cb029d4ee31a.txt",
            "604bcd7fe31c2632fb89a994.txt",
            "604be1f1b3e7d2d69304b680.txt",
            "604b990ff0abcadfb2e0efec.txt",
            "605b75b82d3c11af9e907851.txt",
            "605caf0881cf2953063d2fab.txt",
            "605e06522f4f0a6e847a3dfa.txt",
            "604a6afc039ed6501b26792c.txt",
            "606c9900cc9dabf9542b6d8d.txt",
            "606cb1ee2db0eb990bdb1227.txt",
            "606dd51193fe95bf9552902e.txt",
            "606ca0c67abdf143edcc4c43.txt",
            "606dfd9079e30b337044cdaf.txt",
            "606f64e067a0d01c604aa847.txt",
            "606f347aadebd8f4dd043ac9.txt",
            "606f3b451543aa3bbf378a52.txt",
            "606f5973a214488ae57f0f15.txt",
            "607c4b5060122d7ff114c044.txt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "yalikeit",
            "id": "141710",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4089,
            "FileHash-SHA1": 2596,
            "FileHash-SHA256": 2591
          },
          "indicator_count": 9276,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 38,
          "modified_text": "1545 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-MD5",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "60cc709013f5498fe7e60120.txt",
        "MacOS.Tarmac.yar",
        "60d2f6ee92c20710aad95809.txt",
        "60f02d70854fe24789907049.txt",
        "60b0b9c71621a0149fd3bc07.txt",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "60c1c9c738e6f7877568a75e.txt",
        "Virlock.yar",
        "DearCry Ransomware.yar",
        "60c088d3fd6e59ee86c1b78b.txt",
        "ProjectSauron.yar",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "MacOS.LaoShu.yar",
        "Conti.yar",
        "606dd51193fe95bf9552902e.txt",
        "60ae4abdf56c57022a34ca1a.txt",
        "60e81bf2c570f26603d0c408.txt",
        "60fe86d13f897a5311f50339.txt",
        "602dd49091c952fc7bf4464c.txt",
        "61a8d385e77cc0c52c73069c.txt",
        "HawkEye Keylogger.yar",
        "60c9e28af992867603a7763f.txt",
        "YanluowangRansomware.yar",
        "ThreatFox - Brute Ratel C4.stix",
        "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_64bit.yara",
        "607c4b5060122d7ff114c044.txt",
        "604a4749fc9870e26292768f.txt",
        "CerberRansomware.yar",
        "Djvu.yar",
        "Chapak.yar",
        "61d5b8c1174648df18ff2c24.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Beacon_Dll_All_Versions_MemEnabled.yara",
        "XFilesStealer.yar",
        "60c8b7f02d52c1f5cbaaef96.txt",
        "Medusa Locker.yar",
        "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
        "60df026b54737eb1c5a3dc70.txt",
        "NvRendererMiner.yar",
        "60eec5891dc74a982170a512.txt",
        "CVE-2017-10271.yar",
        "61ea997d233aa9f7a13e2c4a.txt",
        "602fe5ca7a06b19f5d3bcdeb.txt",
        "Punkey.yar",
        "MacOS.XCSSET.yar",
        "60b689c652cd41240e77cfbe.txt",
        "Reaver.yar",
        "60e8316fd31a207cde500085.txt",
        "Sakula.yar",
        "603fd483e52dabf8b0e6223d.txt",
        "60e6c811e797f56de6d1689a.txt",
        "60e6d2a6786d43397db19bc7.txt",
        "60afb8e03c357e7597507757.txt",
        "60cb30e9d2fc165db7083874.txt",
        "60ed75c6b350c56aaa7b2574.txt",
        "LockerGoga.yar",
        "61af3c4cd10c07193a7c54e2.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager_Bin_v2_5_through_v4_x.yara",
        "ThreatFox - Nymaim.stix",
        "Mirai.yar",
        "ThreatFox - Sliver.stix",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_Dll_v3_11_to_v3_14.yara",
        "602d5044d7b695af9c39ce5f.txt",
        "60ec201a77a3b44bdfa65b4d.txt",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr",
        "PIVY.yar",
        "RokRAT.yar",
        "61b2237176a72463836e24fe.txt",
        "Phorpiex.yar",
        "60bf9746b81c47f6658b7e1a.txt",
        "61ee85024b3758a4a953a386.txt",
        "MacOS.BirdMiner.yar",
        "601d829edc72a52a03fea3a7.txt",
        "ThreatFox - FTCODE.stix",
        "61a79adb823719a2ddf8a0b4.txt",
        "Magnat.yar",
        "61b77e54cc69421a2fe7ca30.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_Dll_v4_x.yara",
        "60e814a5c824808f12b19bc7.txt",
        "606f347aadebd8f4dd043ac9.txt",
        "MacOS.Kitm.yar",
        "60c341dc8964edd2e2fcb651.txt",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "DarkVNC.yar",
        "Darkside.yar",
        "MassLogger.yar",
        "Curator Ransomware.yar",
        "AceDeceiver.yar",
        "NetWire RAT.yar",
        "MNKit.yar",
        "Pysa.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Smbstager_Bin_v2_5_through_v4_x.yara",
        "Axelo - Robtex.com.stix",
        "NjRat.yar",
        "Pegasus.yar",
        "61dc3d0b1af759e6a8868d20.txt",
        "Tinba.yar",
        "60f12a9bc1e8763fef70a512.txt",
        "60f1357c15569fb2a28d6d8d.txt",
        "60d9aedbe0ea24a870fd26c7.txt",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template__x32_x64_Ps1_v1_45_to_v2_5_and_v3_11_to_v3_14.yara",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse64_Bin_v2_5_through_v4_x.yara",
        "BasBanke.yar",
        "61e039354995bacf49e507ad.txt",
        "604a40993962cb029d4ee31a.txt",
        "61ea977759cc28216fa93688.txt",
        "60da2c80aa5400db8f1561d5.txt",
        "60cb37bf5fe8246bb2556969.txt",
        "61b886db3f57da33ac504548.txt",
        "61c327ab3c1ce914f02ef526.txt",
        "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
        "Pony.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuactoken_x64_Dll_v3_11_to_v3_14.yara",
        "KRBanker.yar",
        "Glupteba.yar",
        "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
        "PassCV.yar",
        "60d9e694cf4ac84aec30c7e6.txt",
        "60ffcd56a7dc0038376fe52e.txt",
        "60be1d277d109b2b37060c4c.txt",
        "60df059aa243861016a3dc70.txt",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "ThreatFox - Sorillus RAT.stix",
        "Ramdo.yar",
        "60cb66ed91d51ab92ec3535f.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpsstager64_Bin_v3_2_through_v4_x.yara",
        "61a4fea45999d467dfe004e7.txt",
        "60d497443a1d73f8622132cc.txt",
        "60af6e488de8bc838892a75e.txt",
        "601aedb7c7c215c1dc3bb6db.txt",
        "602beffabc1975c22c394912.txt",
        "60d58e305f20d7e67d3aff3b.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_x64_Dll_v3_3_to_v3_14_and_Sleeve_Bypassuac_x64_Dll_v4_0_and_v4_x.yara",
        "60d0afbc395c24edefb33bb9.txt",
        "61a4f833001372795ade9530.txt",
        "61b864ed5388614b699a858a.txt",
        "Necro.yar",
        "61cdba240cd1f98f6a1e138f.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind_Bin_v2_5_through_v4_x.yara",
        "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
        "61b8b6a666a6707ae9ccce49.txt",
        "CryptoFortress.yar",
        "Android.Psiphone.yar",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "602fe5463185aba3fb999b4e.txt",
        "61dd6333c3a0bac56296dd37.txt",
        "60d48bbcfde9f64a34361a14.txt",
        "61c078ca8294b0d42f4c2b6e.txt",
        "606f64e067a0d01c604aa847.txt",
        "Kriptovor.yar",
        "61af93b30f8cd95e3deede67.txt",
        "61cd9f294cca4dfa82461445.txt",
        "CryptBot.yar",
        "605e06522f4f0a6e847a3dfa.txt",
        "60f694ae9a2e2533cb900d55.txt",
        "602d3c9c7078054d4492c9a2.txt",
        "602fe96189be26708dfafe17.txt",
        "61af436c8de74c0a6c9d117c.txt",
        "Tor2Mine.yar",
        "Azorult.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Vbs_v3_3_to_v4_x.yara",
        "60f6a2cbd3661acc8a43eb28.txt",
        "61a4fb7c9b88f16b103c151d.txt",
        "GuLoader.yar",
        "ThreatFox - BRATA.stix",
        "60bdfb172c85862f931deced.txt",
        "Dyre.yar",
        "GriftHorse.yar",
        "60db027b309038564ad88c9f.txt",
        "60f94199d6a38e9d93f50339.txt",
        "60d9b897ad9b12583b784ae7.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager64_Bin_v3_2_through_v4_x.yara",
        "MacOS.Macma.yar",
        "602d71551b7f59ad26f84d23.txt",
        "MacOS.Shlayer.yar",
        "ThreatFox - Lumma Stealer.stix",
        "601da88ef3497825aaee8aaa.txt",
        "FighterPOS.yar",
        "61b207a3724c6259ec7d78e9.txt",
        "DecafRansomware.yar",
        "61a8dfe2a333faf90e50f7b3.txt",
        "60c34510bd6707ce53355efc.txt",
        "ThreatFox - IRATA.stix",
        "60d344aae66268d9b2a55c3a.txt",
        "61c1c02691a6120724220e4e.txt",
        "61d462688b564edb5e8bbaad.txt",
        "ThreatFox - PrivateLoader.stix",
        "cobalt.json",
        "60ec2a9f558af4c0bfe16a46.txt",
        "Andromeda.yar",
        "DiavolRansomware.yar",
        "https://www.virustotal.com/gui/file/018ef51a2af287a3d665e5057e6367eb0a5d5ef5a807af6c255eba26d20b4ccf/community",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Powersniff.yar",
        "Babadeda.yar",
        "Pushdo.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_injector_Exe_v1_44_to_v2_0_49.yara",
        "60f92ab428e945a165d2f0d9.txt",
        "61e9290cfb0531e85d086579.txt",
        "Coinvault.yar",
        "60e5a6d969b07b864b061d92.txt",
        "Sanya.yar",
        "60caff34051d70ff641c84d7.txt",
        "60d04622f95b5aa9f78bf577.txt",
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "CertBreaker.yar",
        "604bcd7fe31c2632fb89a994.txt",
        "60ae09552e0eaac5c0861ab4.txt",
        "Exaramel.yar",
        "Emdivi.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__32bit_v2_x_to_4_x.yara",
        "61d41cf8b01ad37efdf21081.txt",
        "60e6ca542cd6b730d5500085.txt",
        "61bb31bceb547f7142333d49.txt",
        "NitlovePOS.yar",
        "60c1d1c38a092f05e2faa786.txt",
        "Escelar.yar",
        "602ebc6fe4fa4f06f6772f11.txt",
        "60afece345be6dfd2a66ea3c.txt",
        "60cb0868a8196a64861c84d7.txt",
        "ShinoLocker.yar",
        "60b8a178a6e813e88be3181b.txt",
        "60b89765d9d4209af982cf7c.txt",
        "60d2f18dfd693f4314446f84.txt",
        "60dd70ecf3795ef2a7fd26c7.txt",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Locky Ransomware.yar",
        "61dea43f2151cf47ba7fed44.txt",
        "ShimRAT.yar",
        "Axelo - Robtex.com.csv",
        "60d584d46294b971bc361a14.txt",
        "Siloscape.yar",
        "602ecfb40524de16ef1b6fa3.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Py_v3_3_to_v4_x.yara",
        "GlobeImposterRansomware.yar",
        "60d9ec0c972304a313b416b3.txt",
        "61d85b5006fdef2345a10363.txt",
        "603ff1e9027d1641595b83d4.txt",
        "TrickGate.yar",
        "QuasarRAT.yar",
        "Blackhole EK.yar",
        "Loda RAT.yar",
        "61bca21cf212a6842e17c00b.txt",
        "60f82394e6c1b7c6ec7b9978.txt",
        "61ea84ddcfa8b73320e779df.txt",
        "60f93f3cc50f9e04d926b1b5.txt",
        "Android.Hummingbad.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Dnsstager_Bin_v1_47_through_v4_x.yara",
        "Numando.yar",
        "61ba1e66f9edc63a27ce0100.txt",
        "MacOS.Zuru.yar",
        "MacOS.Pirrit.yar",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "MacOS.AdLoad.yar",
        "60c1bd0453d20003e473d335.txt",
        "Clownic Ransomware.yar",
        "60ae0cfbbabd2c9a40d9a2c2.txt",
        "60c0c49d876c2e8d6429cd71.txt",
        "ThreatFox - Raspberry Robin.stix",
        "Jupyter.yar",
        "60dc81564829a831b27da15f.txt",
        "Molerats.yar",
        "Elirks.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_Sct_v3_3_to_v4_x.yara",
        "MacOS.Cointicker.yar",
        "60f676ce7abde68cd3dc5ede.txt",
        "NetFilter.yar",
        "Werdlod.yar",
        "60e5a00ab56614eff266ef0b.txt",
        "DCRat.yar",
        "Axelo - vaet.com.json",
        "60f54edc2f628190f573717b.txt",
        "SkypeWorm.yar",
        "FritzFrog.yar",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "606ca0c67abdf143edcc4c43.txt",
        "60c31c4e4978e9721446c121.txt",
        "60b0cd1697da17aefe01db85.txt",
        "https://labs.inquest.net/iocdb",
        "61caf93b1c17a0fbcc724692.txt",
        "CubaRansomware.yar",
        "Filmkan.yar",
        "606f3b451543aa3bbf378a52.txt",
        "60f01d8cfe51e550951c8023.txt",
        "https://github.com/bartblaze/Yara-rules/blob/master/rules/hacktools/RDPWrap.yar",
        "AgentTesla.yar",
        "60f69abe78efabfdc725eb5e.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/Sliver/Sliver__Implant_32bit.yara",
        "Android.Xavier.yar",
        "61d2f8fad0b6469cf1b4aa56.txt",
        "ImminentMonitor.yar",
        "Samsam Ransomware.yar",
        "CobaltStrike.yar",
        "60f000072f3b86f765907049.txt",
        "AtomSilo.yar",
        "https://www.virustotal.com/gui/collection/threatfox_win_cobalt_strike",
        "Oscorp.yar",
        "60f05cb87f7c642309de71ef.txt",
        "60b9ca2c4ba7e11e71060c4c.txt",
        "60f7eaafe05663ddea26b1b5.txt",
        "Lokibot.yar",
        "61d590f57f137aee980ab4aa.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32_and_Resources_Dropper_v1_45_to_v4_x.yara",
        "Stegoloader.yar",
        "Banload.yar",
        "60be05932c2ce1ef655b0bb5.txt",
        "BotenaGo.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bind64_Bin_v2_5_through_v4_x.yara",
        "60c23b8ce911becad33c4829.txt",
        "60f597533e911956a673717b.txt",
        "Axelo - Stolec kradnie krypto.stix",
        "61b774d6e85500828664f9e9.txt",
        "60d0aaf6060a9c3b804a4d0c.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_Dll_v4_0_to_v4_x.yara",
        "Nanhaishu.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Elevate_X64_Dll_v3_0_to_v3_14_and_Sleeve_Elevate_X64_Dll_v4_x.yara",
        "606c9900cc9dabf9542b6d8d.txt",
        "JSocket.yar",
        "TeslaCrypt.yar",
        "60f7f55ab4b22e92326a3f0e.txt",
        "61dfe35d4ffb7b92b8c2cf93.txt",
        "60ba4f741e3b2b85285b0bb5.txt",
        "DanaBot.yar",
        "60fadfc16251d4a50ff50339.txt",
        "60c86d50c9ac3534790487d5.txt",
        "61ea88bbc174f5e9cd25de67.txt",
        "601da173ed7d3e7e31c67c3d.txt",
        "MacOS.Convuster.yar",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "61a7a4ab87dda2ec4c035c7e.txt",
        "60cb6b6e22caa5b8857044af.txt",
        "RawPOS.yar",
        "MacOS.KeRanger.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Covertvpn_Dll_v2_1_to_v4_x.yara",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Bypassuac_Dll_v1_49_to_v3_14_and_Sleeve_Bypassuac_Dll_v4_0_to_v4_x.yara",
        "Remcos.yar",
        "60ca189478da06f3f78160b5.txt",
        "Ave Maria.yar",
        "AsyncRAT.yar",
        "60ddbf90b3211a60e87da15f.txt",
        "SmokeLoader.yar",
        "CVE-2017-11882.yar",
        "Zumanek.yar",
        "604a6afc039ed6501b26792c.txt",
        "Bizarro.yar",
        "60ec06ea60906a8a9c69cf23.txt",
        "61e59f497022f0fb28114f96.txt",
        "60ebfd6c98d851026cd2505d.txt",
        "61e6e07fe17676b3e61f7052.txt",
        "60f1832853d980c86f70a513.txt",
        "PlugX.yar",
        "Zeus.yar",
        "60afb5e9fc9ead03c5f4ca2d.txt",
        "61a64eccb0e65ef59a57e5d4.txt",
        "Stantinko.yar",
        "60d1b021668edffa00a03423.txt",
        "61c5ae2eaf98244960cff47a.txt",
        "MacOS.Calisto.yar",
        "60be30837c3f13bb72131f36.txt",
        "Keybase.yar",
        "Daserf.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Browserpivot_x64_Bin_v1_48_to_v3_14_and_Sleeve_Browserpivot_x64_Dll_v4_0_to_v4_x.yara",
        "LeetMX.yar",
        "Bedep.yar",
        "601c62e85ef2f3b4f83bb6db.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x.yara",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Xor_Bin__64bit_v3_12_to_4_x.yara",
        "https://github.com/chronicle/GCTI/tree/main/YARA/CobaltStrike",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact64_v1_49_to_v4_x.yara",
        "60be3e3f6ba2c7d1bec747a2.txt",
        "60f0059134f2d6364de00c85.txt",
        "61d81f95eecd468222f85464.txt",
        "60f07bbde76ba1899ade71ef.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Reverse_Bin_v2_5_through_v4_x.yara",
        "SnakeKeylogger.yar",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "60f930c9c1a69acdb28adea6.txt",
        "61b2290ee7cb4628d56979d5.txt",
        "60afabc561644068d15f3a54.txt",
        "Fareit.yar",
        "61c19d40e4243f84e1d54891.txt",
        "Amavaldo.yar",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "60db5d29be7b348bae7da15f.txt",
        "ThreatFox - Erbium Stealer.stix",
        "60e02f9e498dfdf25caf7753.txt",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Vermin.yar",
        "606dfd9079e30b337044cdaf.txt",
        "606cb1ee2db0eb990bdb1227.txt",
        "61c9aff8d72c2a4731021bee.txt",
        "604b87040f5726e9ef553290.txt",
        "Valyria.yar",
        "61b75c2915050cf6e811fef9.txt",
        "61dc1f38a5b5b90adf7775d0.txt",
        "605b75b82d3c11af9e907851.txt",
        "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv",
        "60afd2d5ce95a296d0f9323e.txt",
        "60fa8321254ba0501adc5ede.txt",
        "Razy.yar",
        "603d10bdb7248018661ef46c.txt",
        "61b7707ea83c68d70d893db9.txt",
        "61c9a1f535cfaffb92279bc1.txt",
        "RaccoonStealer.yar",
        "HaronRansomware.yar",
        "60e82e4eed04e618467d80d2.txt",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x64_Ps1_v3_0_to_v4_x_excluding_3_12_3_13.yara",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Httpstager_Bin_v2_5_through_v4_x.yara",
        "606f5973a214488ae57f0f15.txt",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "Skype Worm.yar",
        "61ea8f0fe72ea3d1783f483a.txt",
        "Nanocore.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Artifact32svc_Exe_v1_49_to_v4_x.yara",
        "Grief.yar",
        "61c5a0f6b228644655962c31.txt",
        "61bc97b3387f34a50e15fd38.txt",
        "61c9d383c93ed2a56b46ffd2.txt",
        "61a65236f6ac8afd687892c6.txt",
        "603d19ff5e6680fa73bbf7b3.txt",
        "60b7a5d658786519b7e5e9dc.txt",
        "Ohagi.yar",
        "Babuk.yar",
        "GoSearch.yar",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "601ad65bb1f0c3f6116d20ab.txt",
        "60e81a24e8d59fbc73500085.txt",
        "Cobalt Strike.yar",
        "CustomTiIndicators.20220726.191851.csv",
        "FormBook.yar",
        "BandarChor Ransomware.yar",
        "60eff240c7c9cb4f24907049.txt",
        "60efe4047c9b9b9564314643.txt",
        "603eb1abdd4812819c64e197.txt",
        "61b8b4b348dfed61dd98e394.txt",
        "Poseidon.yar",
        "Emotet.yar",
        "605caf0881cf2953063d2fab.txt",
        "601c299359e0682c185cf686.txt",
        "MacOS.Dummy.yar",
        "60b64ba03137e59e5c2fec77.txt",
        "DnSpyTrojan.yar",
        "RedLine.yar",
        "PlatinumGroup.yar",
        "60b8bbf9744408d3a83062f7.txt",
        "FakeDivX.yar",
        "60df03f767571cacb82a5f53.txt",
        "60eeb8b1f8a87529ba8d6d8c.txt",
        "604b990ff0abcadfb2e0efec.txt",
        "Gauss.yar",
        "MosesStaff.yar",
        "Bartalex.yar",
        "Shell Crew.yar",
        "Linux.Spike.yar",
        "BitRAT.yar",
        "https://github.com/chronicle/GCTI/blob/main/YARA/CobaltStrike/CobaltStrike__Resources_Template_x86_Vba_v3_8_to_v4_x.yara",
        "ThreatFox - RM3.stix",
        "60d9e9095f98a9600641d921.txt",
        "604be1f1b3e7d2d69304b680.txt"
      ],
      "related": {
        "alienvault": {
          "adversary": [
            "APT29"
          ],
          "malware_families": [
            "Cobaltstrike",
            "Freshfire"
          ],
          "industries": [
            "Ngo",
            "Government"
          ]
        },
        "other": {
          "adversary": [
            "APT29"
          ],
          "malware_families": [
            "Vx_underground2_shinolocker",
            "Cobaltstrike",
            "Cobalt strike",
            "Compat",
            "Freshfire"
          ],
          "industries": [
            "Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in",
            "Government",
            "Ngo"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 34,
  "pulses": [
    {
      "id": "60afece345be6dfd2a66ea3c",
      "name": "Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns",
      "description": "Volexity, a security firm, has identified and identified a phishing campaign targeting government agencies across the United States and Europe that is believed to be related to APT29.",
      "modified": "2021-07-02T00:00:45.508000",
      "created": "2021-05-27T19:02:59.218000",
      "tags": [
        "cobaltstrike",
        "apt29",
        "dark halo",
        "lnk file",
        "usaid",
        "europe",
        "malware",
        "NOBELIUM"
      ],
      "references": [
        "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
        "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
        "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
        "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
        "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
      ],
      "public": 1,
      "adversary": "APT29",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "CobaltStrike",
          "display_name": "CobaltStrike",
          "target": null
        },
        {
          "id": "FreshFire",
          "display_name": "FreshFire",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1610",
          "name": "Deploy Container",
          "display_name": "T1610 - Deploy Container"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        }
      ],
      "industries": [
        "Government",
        "NGO"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 327,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 19,
        "FileHash-MD5": 42,
        "FileHash-SHA256": 74,
        "FileHash-SHA1": 62,
        "domain": 21,
        "URL": 5,
        "YARA": 3
      },
      "indicator_count": 226,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 377503,
      "modified_text": "1752 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-MD5",
      "related_indicator_is_active": 1
    },
    {
      "id": "698e93e1ab02db8c49e8c3ed",
      "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
      "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
      "modified": "2026-04-19T08:11:41.130000",
      "created": "2026-02-13T03:00:49.872000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27678,
        "FileHash-SHA256": 47676,
        "FileHash-MD5": 42534,
        "FileHash-SHA1": 23213,
        "hostname": 33703,
        "URL": 75433,
        "SSLCertFingerprint": 30,
        "CVE": 7582,
        "email": 313,
        "FileHash-IMPHASH": 8,
        "CIDR": 26205,
        "JA3": 1,
        "IPv4": 80,
        "URI": 5
      },
      "indicator_count": 284461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1 hour ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-MD5",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf64eccb5d39a90a3c391e",
      "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
      "description": "",
      "modified": "2026-03-27T00:30:39.055000",
      "created": "2026-03-22T03:41:32.565000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": "698e93e1ab02db8c49e8c3ed",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27572,
        "FileHash-SHA256": 46076,
        "FileHash-MD5": 42177,
        "FileHash-SHA1": 22874,
        "hostname": 33438,
        "URL": 74810,
        "SSLCertFingerprint": 21,
        "CVE": 7579,
        "email": 297,
        "FileHash-IMPHASH": 8,
        "CIDR": 26203,
        "JA3": 1
      },
      "indicator_count": 281056,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 145,
      "modified_text": "23 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-MD5",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf64e1d5e06aa6207f78de",
      "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
      "description": "",
      "modified": "2026-03-27T00:30:39.055000",
      "created": "2026-03-22T03:41:21.863000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": "698e93e1ab02db8c49e8c3ed",
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27572,
        "FileHash-SHA256": 46076,
        "FileHash-MD5": 42177,
        "FileHash-SHA1": 22874,
        "hostname": 33438,
        "URL": 74810,
        "SSLCertFingerprint": 21,
        "CVE": 7579,
        "email": 297,
        "FileHash-IMPHASH": 8,
        "CIDR": 26203,
        "JA3": 1
      },
      "indicator_count": 281056,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "23 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-MD5",
      "related_indicator_is_active": 1
    },
    {
      "id": "682fb98d14460e00a2f5af28",
      "name": "InQuest - 22-05-2025",
      "description": "",
      "modified": "2025-06-21T23:02:56.610000",
      "created": "2025-05-22T23:55:57.793000",
      "tags": [],
      "references": [
        "https://labs.inquest.net/iocdb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunterAutoFeed",
        "id": "182496",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 335,
        "URL": 175,
        "domain": 45,
        "hostname": 33,
        "FileHash-SHA1": 29,
        "FileHash-MD5": 9
      },
      "indicator_count": 626,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1600,
      "modified_text": "301 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "682e68a1bc32fdebbbef1623",
      "name": "InQuest - 21-05-2025",
      "description": "",
      "modified": "2025-06-20T23:02:09.595000",
      "created": "2025-05-21T23:58:25.183000",
      "tags": [],
      "references": [
        "https://labs.inquest.net/iocdb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunterAutoFeed",
        "id": "182496",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 35,
        "URL": 181,
        "FileHash-SHA1": 16,
        "FileHash-MD5": 11,
        "FileHash-SHA256": 350,
        "hostname": 56
      },
      "indicator_count": 649,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1601,
      "modified_text": "302 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709acc23b1e58ccaf05c25",
      "name": "Malwarebazaar 5",
      "description": "",
      "modified": "2023-12-06T16:01:16.464000",
      "created": "2023-12-06T16:01:16.464000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 50000,
        "FileHash-MD5": 9782,
        "FileHash-SHA1": 9782
      },
      "indicator_count": 69564,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 114,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "657094512514cf25b4735082",
      "name": "IOC from some VT and github",
      "description": "",
      "modified": "2023-12-06T15:33:37.085000",
      "created": "2023-12-06T15:33:37.085000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1589,
        "FileHash-MD5": 396,
        "FileHash-SHA1": 395,
        "hostname": 211,
        "domain": 376,
        "URL": 357
      },
      "indicator_count": 3324,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570944c48bd2a6a147f53a4",
      "name": "IOC from some VT and github",
      "description": "",
      "modified": "2023-12-06T15:33:32.656000",
      "created": "2023-12-06T15:33:32.656000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1597,
        "FileHash-MD5": 397,
        "FileHash-SHA1": 396,
        "hostname": 211,
        "domain": 376,
        "URL": 357,
        "CIDR": 1,
        "CVE": 1
      },
      "indicator_count": 3336,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "657090d572206e3ad162097d",
      "name": "muestra",
      "description": "",
      "modified": "2023-12-06T15:18:45.671000",
      "created": "2023-12-06T15:18:45.671000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1857,
        "FileHash-SHA1": 1918,
        "FileHash-SHA256": 3744,
        "domain": 1,
        "email": 2
      },
      "indicator_count": 7522,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330",
    "type": "Hash"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776590748.0440297
}