{
  "type": "Domain",
  "indicator": "entrustdatacard.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/entrustdatacard.com",
    "alexa": "http://www.alexa.com/siteinfo/entrustdatacard.com",
    "indicator": "entrustdatacard.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2911704835,
      "indicator": "entrustdatacard.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 10,
      "pulses": [
        {
          "id": "66c08b488620dac7697026c7",
          "name": "Fakefolder | Ransom:Win32/CVE affecting HCA Healthcare cloud",
          "description": "Cloud computing - User Acceptance Testing (UAT)\napparently used by HCA one of the nations leading healthcare providers. It's seems HCA's cloud is compromised. The cloud has a number of high priority vulnerabilities, malware, ransomware, zero day, etc.  Patient accounts aiming involved, (some patients received letters of serious PII, PHI compromise) lost records, patient blacklisting, hacking, and nefarious manipulations by providers. I've been made aware of CORHIO closing compromised patient accounts. Some patients account access and data has reportedly been lost.\n#VirTool:Win32/Obfuscator.ADB\nALF:HeraklezEval:Ransom:Win32/CVE\nRansom:Win32/StopCrypt.AK!MTB\nRansom:Win32/Wannaren.A\nTrojan:Win32/BlackMon\nTrojan:Win32/Fakefolder\nTulach Malware",
          "modified": "2024-10-15T14:02:54.772000",
          "created": "2024-08-17T11:36:40.810000",
          "tags": [
            "microsoft edge",
            "iocs",
            "alberta ndp",
            "security",
            "vc rescue",
            "disk",
            "apple",
            "google",
            "windows",
            "powershell",
            "security https",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "detection list",
            "site",
            "cisco umbrella",
            "alexa top",
            "blacklist",
            "million",
            "mail spammer",
            "firehol",
            "ip address",
            "noname057",
            "anonymizer",
            "firehol proxy",
            "proxy",
            "india mail",
            "malware",
            "full name",
            "first",
            "v3 serial",
            "number",
            "cus odigicert",
            "global tls",
            "rsa4096 sha256",
            "ca1 validity",
            "subject public",
            "key info",
            "dns replication",
            "date",
            "script script",
            "as12912",
            "a domains",
            "a li",
            "poland unknown",
            "t mobile",
            "domains",
            "przejd",
            "passive dns",
            "authority",
            "meta",
            "accept",
            "cname",
            "record type",
            "ttl value",
            "aaaa",
            "poland",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "location poland",
            "asnone united",
            "moved",
            "location",
            "vary",
            "accept encoding",
            "content type",
            "virtool",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "search",
            "date hash",
            "next",
            "showing",
            "as39198",
            "body",
            "window",
            "certificate",
            "hostname",
            "unknown",
            "red bull",
            "script urls",
            "as2828 verizon",
            "ireland unknown",
            "gmt content",
            "as8068",
            "as8075",
            "servers",
            "creation date",
            "united",
            "trojan",
            "trojan features",
            "win32",
            "msr aug",
            "urls",
            "reverse dns",
            "trojandropper",
            "historical ssl",
            "referrer",
            "infiltrate",
            "threat network",
            "malicious",
            "snapchat",
            "eternal blue",
            "sneaky simay",
            "groups",
            "covert",
            "probe",
            "whois lookup",
            "domain name",
            "united",
            "as15169 google",
            "a nxdomain",
            "germany",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "port",
            "dynamic",
            "domain",
            "file name",
            "pcap",
            "copy",
            "url host",
            "port method",
            "user agent",
            "okrnserver",
            "002000",
            "hit tcpmemhit",
            "algorithm",
            "data",
            "cus oentrust",
            "entrust",
            "l1k validity",
            "cpl lwarszawa",
            "ot mobile",
            "status",
            "name servers",
            "as6354",
            "mtb aug",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "location united",
            "win32 exe",
            "pe32 executable",
            "ms windows",
            "intel",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "vs2010",
            "info compiler",
            "products",
            "vs2008",
            "header intel",
            "name md5",
            "type",
            "language",
            "ascii text",
            "cyrillic",
            "registrar of",
            "domain names",
            "ii llc",
            "contacted",
            "file type",
            "mb file",
            "graph",
            "ip detections",
            "country",
            "type name",
            "network",
            "tsara brashears",
            "december",
            "typhon reborn",
            "speakez securus",
            "hacktool",
            "emotet",
            "formbook",
            "critical",
            "installer",
            "tofsee",
            "hiddentear",
            "cnc",
            "email collection",
            "apple data",
            "data collection",
            "tsara brashears",
            "for privacy",
            "record value",
            "emails",
            "expiration date",
            "swipper",
            "tulach",
            "aitm",
            "query",
            "observed dns",
            "activity dns",
            "total",
            "google llc",
            "pe32",
            "write",
            "april",
            "defender",
            "otx telemetry",
            "win32cve aug",
            "polska s",
            "copyright",
            "levelblue",
            "dashboard",
            "pulse submit",
            "url analysis",
            "as20940",
            "as16625 akamai",
            "entrustdns",
            "france",
            "entries",
            "refresh",
            "443 ma2592000",
            "net174",
            "net1740000",
            "mcics",
            "read c",
            "write c",
            "tlsv1",
            "default",
            "module load",
            "execution",
            "dock",
            "persistence",
            "xport",
            "redacted for",
            "privacy tech",
            "privacy admin",
            "organization",
            "postal code",
            "stateprovince",
            "server",
            "registrar abuse",
            "code",
            "high priority",
            "critical",
            "CVE-2023-29059"
          ],
          "references": [
            "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe",
            "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
            "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
            "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
            "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
            "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
            "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
            "nr-data.net [Apple Private Data Collection]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
            "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
            "record-viewer-application.hcahealthcare.cloud",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
            "Tulach IP: 114.114.114.114",
            "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
            "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
            "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
            "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
            "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
            "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
            "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
            "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
            "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
            "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/BlackMon",
              "display_name": "Trojan:Win32/BlackMon",
              "target": "/malware/Trojan:Win32/BlackMon"
            },
            {
              "id": "Trojan:Win32/Fakefolder",
              "display_name": "Trojan:Win32/Fakefolder",
              "target": "/malware/Trojan:Win32/Fakefolder"
            },
            {
              "id": "Ransom:Win32/Wannaren.A",
              "display_name": "Ransom:Win32/Wannaren.A",
              "target": "/malware/Ransom:Win32/Wannaren.A"
            },
            {
              "id": "Ransom:Win32/StopCrypt.AK!MTB",
              "display_name": "Ransom:Win32/StopCrypt.AK!MTB",
              "target": "/malware/Ransom:Win32/StopCrypt.AK!MTB"
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Civilian Society",
            "Telecommunications",
            "Networking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1975,
            "FileHash-SHA1": 1731,
            "FileHash-SHA256": 4646,
            "URL": 636,
            "domain": 283,
            "hostname": 798,
            "email": 12,
            "CVE": 3,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 10086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570897ecb6cec4777625431",
          "name": "www.routerlogin.net",
          "description": "",
          "modified": "2023-12-06T14:47:26.604000",
          "created": "2023-12-06T14:47:26.604000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1532,
            "domain": 2033,
            "URL": 11153,
            "hostname": 2800,
            "FileHash-SHA1": 5,
            "email": 3,
            "FileHash-MD5": 6
          },
          "indicator_count": 17532,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570800373899fd03e2e49db",
          "name": "Democrats.org",
          "description": "",
          "modified": "2023-12-06T14:06:59.250000",
          "created": "2023-12-06T14:06:59.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3114,
            "domain": 3501,
            "hostname": 3860,
            "URL": 17938,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707ed1b2c24f71d408f58a",
          "name": "lvc.org",
          "description": "",
          "modified": "2023-12-06T14:01:52.611000",
          "created": "2023-12-06T14:01:52.611000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 3051,
            "FileHash-SHA256": 524,
            "URL": 14286,
            "domain": 1501,
            "email": 3,
            "FileHash-SHA1": 12
          },
          "indicator_count": 19379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707c9df9c33dd5983b366a",
          "name": "TrueCar.com",
          "description": "",
          "modified": "2023-12-06T13:52:29.953000",
          "created": "2023-12-06T13:52:29.953000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1156,
            "domain": 4253,
            "hostname": 4203,
            "URL": 17071,
            "FileHash-MD5": 13,
            "FileHash-SHA1": 5,
            "email": 1
          },
          "indicator_count": 26702,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d6ebf9f500ae71844f3541",
          "name": "The Dextroverse",
          "description": "Https://www.dextroverse.org/",
          "modified": "2023-09-17T00:03:50.920000",
          "created": "2023-08-12T02:18:33.910000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 296,
            "domain": 270,
            "FileHash-SHA256": 3,
            "email": 29,
            "URL": 329,
            "FileHash-MD5": 5,
            "CVE": 3,
            "FileHash-SHA1": 2,
            "URI": 1
          },
          "indicator_count": 938,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "946 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6235e08a628e6c19d898f05c",
          "name": "www.routerlogin.net",
          "description": "",
          "modified": "2022-04-18T00:07:16.048000",
          "created": "2022-03-19T13:54:18.436000",
          "tags": [
            "code",
            "server",
            "san jose",
            "date",
            "key identifier",
            "algorithm",
            "email",
            "registrar url",
            "registry domain",
            "registry expiry",
            "win32 exe",
            "win32 dll",
            "dos exe",
            "android",
            "librouter",
            "network capture",
            "thinclient",
            "setup",
            "type name",
            "referring",
            "technology",
            "dns replication",
            "security",
            "registrar abuse",
            "comodo valkyrie",
            "verdict mobile",
            "rank value",
            "ingestion time",
            "cisco umbrella",
            "dns records",
            "record type",
            "nreum",
            "httponly",
            "netgear router",
            "submission",
            "expirestue",
            "path",
            "netgear twitter",
            "router login",
            "nr agent",
            "Ransomware",
            "WannaCry"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Ransomware.WannaCry-9856297-0",
              "display_name": "Win.Ransomware.WannaCry-9856297-0",
              "target": null
            },
            {
              "id": "Win32:Dracur-D\\ [Cryp]",
              "display_name": "Win32:Dracur-D\\ [Cryp]",
              "target": null
            },
            {
              "id": "Worm:Win32/Krol.A",
              "display_name": "Worm:Win32/Krol.A",
              "target": "/malware/Worm:Win32/Krol.A"
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1532,
            "domain": 2033,
            "hostname": 2800,
            "URL": 11153,
            "email": 3,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 5
          },
          "indicator_count": 17532,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 414,
          "modified_text": "1463 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220c81aaf6fddde0116569a",
          "name": "Democrats.org",
          "description": "",
          "modified": "2022-04-02T00:04:50.405000",
          "created": "2022-03-03T13:52:26.328000",
          "tags": [
            "date",
            "dns replication"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 17938,
            "hostname": 3860,
            "domain": 3501,
            "FileHash-SHA256": 3114,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1479 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6213ffb8b8b4c14bf3c0420f",
          "name": "lvc.org",
          "description": "",
          "modified": "2022-03-23T00:02:04.887000",
          "created": "2022-02-21T21:10:16.849000",
          "tags": [
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "solutions",
            "llc creation",
            "date",
            "categories",
            "ranks rank",
            "value ingestion",
            "time majestic",
            "umbrella",
            "masking enabled",
            "win32 exe",
            "server",
            "email",
            "registrar abuse",
            "practice",
            "gre premium",
            "code",
            "registrar url",
            "score"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 14286,
            "hostname": 3051,
            "domain": 1501,
            "FileHash-SHA256": 524,
            "CVE": 2,
            "email": 3,
            "FileHash-SHA1": 12
          },
          "indicator_count": 19379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1489 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "61e2733e9e57250b5725ab5a",
          "name": "TrueCar.com",
          "description": "",
          "modified": "2022-02-14T00:00:26.279000",
          "created": "2022-01-15T07:09:50.416000",
          "tags": [
            "android",
            "win32 exe",
            "key identifier",
            "win32 dll",
            "x509v3 subject",
            "server",
            "date",
            "registrar abuse",
            "algorithm",
            "markmonitor",
            "format",
            "impact",
            "first",
            "text",
            "email",
            "type name",
            "portable",
            "adguard premium",
            "usus",
            "mozilla firefox",
            "technology",
            "microsoft",
            "security",
            "subdomains",
            "threatseeker",
            "sophos",
            "comodo valkyrie",
            "verdict mobile",
            "rank value",
            "ingestion time",
            "statvoo",
            "cisco umbrella",
            "dns records",
            "record type",
            "ttl value",
            "msms94514764",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnamazon",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "domain status",
            "contact phone",
            "registrar",
            "ca creation",
            "dnssec",
            "domain name",
            "us registrant",
            "links https",
            "path",
            "submission",
            "httponly",
            "expiressat",
            "samesitelax",
            "details links",
            "vehicles comodo",
            "history first",
            "analysis"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 17071,
            "hostname": 4203,
            "FileHash-SHA256": 1156,
            "domain": 4253,
            "FileHash-MD5": 13,
            "FileHash-SHA1": 5,
            "email": 1
          },
          "indicator_count": 26702,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 412,
          "modified_text": "1526 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "nr-data.net [Apple Private Data Collection]",
        "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
        "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
        "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
        "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org",
        "Tulach IP: 114.114.114.114",
        "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
        "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
        "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
        "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
        "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
        "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
        "record-viewer-application.hcahealthcare.cloud",
        "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
        "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
        "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
        "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
        "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
        "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.ransomware.wannacry-9856297-0",
            "Worm:win32/krol.a",
            "Ransom:win32/wannaren.a",
            "#virtool:win32/obfuscator.adb",
            "Alf:heraklezeval:ransom:win32/cve",
            "Win32:dracur-d\\ [cryp]",
            "Trojan:win32/fakefolder",
            "Ransom:win32/stopcrypt.ak!mtb",
            "Trojan:win32/blackmon",
            "Tulach malware"
          ],
          "industries": [
            "Networking",
            "Technology",
            "Telecommunications",
            "Healthcare",
            "Civilian society"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 10,
  "pulses": [
    {
      "id": "66c08b488620dac7697026c7",
      "name": "Fakefolder | Ransom:Win32/CVE affecting HCA Healthcare cloud",
      "description": "Cloud computing - User Acceptance Testing (UAT)\napparently used by HCA one of the nations leading healthcare providers. It's seems HCA's cloud is compromised. The cloud has a number of high priority vulnerabilities, malware, ransomware, zero day, etc.  Patient accounts aiming involved, (some patients received letters of serious PII, PHI compromise) lost records, patient blacklisting, hacking, and nefarious manipulations by providers. I've been made aware of CORHIO closing compromised patient accounts. Some patients account access and data has reportedly been lost.\n#VirTool:Win32/Obfuscator.ADB\nALF:HeraklezEval:Ransom:Win32/CVE\nRansom:Win32/StopCrypt.AK!MTB\nRansom:Win32/Wannaren.A\nTrojan:Win32/BlackMon\nTrojan:Win32/Fakefolder\nTulach Malware",
      "modified": "2024-10-15T14:02:54.772000",
      "created": "2024-08-17T11:36:40.810000",
      "tags": [
        "microsoft edge",
        "iocs",
        "alberta ndp",
        "security",
        "vc rescue",
        "disk",
        "apple",
        "google",
        "windows",
        "powershell",
        "security https",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "sample",
        "detection list",
        "site",
        "cisco umbrella",
        "alexa top",
        "blacklist",
        "million",
        "mail spammer",
        "firehol",
        "ip address",
        "noname057",
        "anonymizer",
        "firehol proxy",
        "proxy",
        "india mail",
        "malware",
        "full name",
        "first",
        "v3 serial",
        "number",
        "cus odigicert",
        "global tls",
        "rsa4096 sha256",
        "ca1 validity",
        "subject public",
        "key info",
        "dns replication",
        "date",
        "script script",
        "as12912",
        "a domains",
        "a li",
        "poland unknown",
        "t mobile",
        "domains",
        "przejd",
        "passive dns",
        "authority",
        "meta",
        "accept",
        "cname",
        "record type",
        "ttl value",
        "aaaa",
        "poland",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "files",
        "location poland",
        "asnone united",
        "moved",
        "location",
        "vary",
        "accept encoding",
        "content type",
        "virtool",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "search",
        "date hash",
        "next",
        "showing",
        "as39198",
        "body",
        "window",
        "certificate",
        "hostname",
        "unknown",
        "red bull",
        "script urls",
        "as2828 verizon",
        "ireland unknown",
        "gmt content",
        "as8068",
        "as8075",
        "servers",
        "creation date",
        "united",
        "trojan",
        "trojan features",
        "win32",
        "msr aug",
        "urls",
        "reverse dns",
        "trojandropper",
        "historical ssl",
        "referrer",
        "infiltrate",
        "threat network",
        "malicious",
        "snapchat",
        "eternal blue",
        "sneaky simay",
        "groups",
        "covert",
        "probe",
        "whois lookup",
        "domain name",
        "united",
        "as15169 google",
        "a nxdomain",
        "germany",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "port",
        "dynamic",
        "domain",
        "file name",
        "pcap",
        "copy",
        "url host",
        "port method",
        "user agent",
        "okrnserver",
        "002000",
        "hit tcpmemhit",
        "algorithm",
        "data",
        "cus oentrust",
        "entrust",
        "l1k validity",
        "cpl lwarszawa",
        "ot mobile",
        "status",
        "name servers",
        "as6354",
        "mtb aug",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "location united",
        "win32 exe",
        "pe32 executable",
        "ms windows",
        "intel",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "vs2010",
        "info compiler",
        "products",
        "vs2008",
        "header intel",
        "name md5",
        "type",
        "language",
        "ascii text",
        "cyrillic",
        "registrar of",
        "domain names",
        "ii llc",
        "contacted",
        "file type",
        "mb file",
        "graph",
        "ip detections",
        "country",
        "type name",
        "network",
        "tsara brashears",
        "december",
        "typhon reborn",
        "speakez securus",
        "hacktool",
        "emotet",
        "formbook",
        "critical",
        "installer",
        "tofsee",
        "hiddentear",
        "cnc",
        "email collection",
        "apple data",
        "data collection",
        "tsara brashears",
        "for privacy",
        "record value",
        "emails",
        "expiration date",
        "swipper",
        "tulach",
        "aitm",
        "query",
        "observed dns",
        "activity dns",
        "total",
        "google llc",
        "pe32",
        "write",
        "april",
        "defender",
        "otx telemetry",
        "win32cve aug",
        "polska s",
        "copyright",
        "levelblue",
        "dashboard",
        "pulse submit",
        "url analysis",
        "as20940",
        "as16625 akamai",
        "entrustdns",
        "france",
        "entries",
        "refresh",
        "443 ma2592000",
        "net174",
        "net1740000",
        "mcics",
        "read c",
        "write c",
        "tlsv1",
        "default",
        "module load",
        "execution",
        "dock",
        "persistence",
        "xport",
        "redacted for",
        "privacy tech",
        "privacy admin",
        "organization",
        "postal code",
        "stateprovince",
        "server",
        "registrar abuse",
        "code",
        "high priority",
        "critical",
        "CVE-2023-29059"
      ],
      "references": [
        "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe",
        "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
        "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
        "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
        "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
        "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
        "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
        "nr-data.net [Apple Private Data Collection]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
        "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
        "record-viewer-application.hcahealthcare.cloud",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "Tulach IP: 114.114.114.114",
        "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
        "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
        "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
        "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
        "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
        "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
        "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
        "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
        "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/BlackMon",
          "display_name": "Trojan:Win32/BlackMon",
          "target": "/malware/Trojan:Win32/BlackMon"
        },
        {
          "id": "Trojan:Win32/Fakefolder",
          "display_name": "Trojan:Win32/Fakefolder",
          "target": "/malware/Trojan:Win32/Fakefolder"
        },
        {
          "id": "Ransom:Win32/Wannaren.A",
          "display_name": "Ransom:Win32/Wannaren.A",
          "target": "/malware/Ransom:Win32/Wannaren.A"
        },
        {
          "id": "Ransom:Win32/StopCrypt.AK!MTB",
          "display_name": "Ransom:Win32/StopCrypt.AK!MTB",
          "target": "/malware/Ransom:Win32/StopCrypt.AK!MTB"
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology",
        "Civilian Society",
        "Telecommunications",
        "Networking"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1975,
        "FileHash-SHA1": 1731,
        "FileHash-SHA256": 4646,
        "URL": 636,
        "domain": 283,
        "hostname": 798,
        "email": 12,
        "CVE": 3,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 10086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570897ecb6cec4777625431",
      "name": "www.routerlogin.net",
      "description": "",
      "modified": "2023-12-06T14:47:26.604000",
      "created": "2023-12-06T14:47:26.604000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1532,
        "domain": 2033,
        "URL": 11153,
        "hostname": 2800,
        "FileHash-SHA1": 5,
        "email": 3,
        "FileHash-MD5": 6
      },
      "indicator_count": 17532,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570800373899fd03e2e49db",
      "name": "Democrats.org",
      "description": "",
      "modified": "2023-12-06T14:06:59.250000",
      "created": "2023-12-06T14:06:59.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3114,
        "domain": 3501,
        "hostname": 3860,
        "URL": 17938,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707ed1b2c24f71d408f58a",
      "name": "lvc.org",
      "description": "",
      "modified": "2023-12-06T14:01:52.611000",
      "created": "2023-12-06T14:01:52.611000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "hostname": 3051,
        "FileHash-SHA256": 524,
        "URL": 14286,
        "domain": 1501,
        "email": 3,
        "FileHash-SHA1": 12
      },
      "indicator_count": 19379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707c9df9c33dd5983b366a",
      "name": "TrueCar.com",
      "description": "",
      "modified": "2023-12-06T13:52:29.953000",
      "created": "2023-12-06T13:52:29.953000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1156,
        "domain": 4253,
        "hostname": 4203,
        "URL": 17071,
        "FileHash-MD5": 13,
        "FileHash-SHA1": 5,
        "email": 1
      },
      "indicator_count": 26702,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "64d6ebf9f500ae71844f3541",
      "name": "The Dextroverse",
      "description": "Https://www.dextroverse.org/",
      "modified": "2023-09-17T00:03:50.920000",
      "created": "2023-08-12T02:18:33.910000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ellenmmm",
        "id": "233693",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 296,
        "domain": 270,
        "FileHash-SHA256": 3,
        "email": 29,
        "URL": 329,
        "FileHash-MD5": 5,
        "CVE": 3,
        "FileHash-SHA1": 2,
        "URI": 1
      },
      "indicator_count": 938,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "946 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6235e08a628e6c19d898f05c",
      "name": "www.routerlogin.net",
      "description": "",
      "modified": "2022-04-18T00:07:16.048000",
      "created": "2022-03-19T13:54:18.436000",
      "tags": [
        "code",
        "server",
        "san jose",
        "date",
        "key identifier",
        "algorithm",
        "email",
        "registrar url",
        "registry domain",
        "registry expiry",
        "win32 exe",
        "win32 dll",
        "dos exe",
        "android",
        "librouter",
        "network capture",
        "thinclient",
        "setup",
        "type name",
        "referring",
        "technology",
        "dns replication",
        "security",
        "registrar abuse",
        "comodo valkyrie",
        "verdict mobile",
        "rank value",
        "ingestion time",
        "cisco umbrella",
        "dns records",
        "record type",
        "nreum",
        "httponly",
        "netgear router",
        "submission",
        "expirestue",
        "path",
        "netgear twitter",
        "router login",
        "nr agent",
        "Ransomware",
        "WannaCry"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Ransomware.WannaCry-9856297-0",
          "display_name": "Win.Ransomware.WannaCry-9856297-0",
          "target": null
        },
        {
          "id": "Win32:Dracur-D\\ [Cryp]",
          "display_name": "Win32:Dracur-D\\ [Cryp]",
          "target": null
        },
        {
          "id": "Worm:Win32/Krol.A",
          "display_name": "Worm:Win32/Krol.A",
          "target": "/malware/Worm:Win32/Krol.A"
        }
      ],
      "attack_ids": [],
      "industries": [
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1532,
        "domain": 2033,
        "hostname": 2800,
        "URL": 11153,
        "email": 3,
        "FileHash-MD5": 6,
        "FileHash-SHA1": 5
      },
      "indicator_count": 17532,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 414,
      "modified_text": "1463 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6220c81aaf6fddde0116569a",
      "name": "Democrats.org",
      "description": "",
      "modified": "2022-04-02T00:04:50.405000",
      "created": "2022-03-03T13:52:26.328000",
      "tags": [
        "date",
        "dns replication"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 17938,
        "hostname": 3860,
        "domain": 3501,
        "FileHash-SHA256": 3114,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 408,
      "modified_text": "1479 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6213ffb8b8b4c14bf3c0420f",
      "name": "lvc.org",
      "description": "",
      "modified": "2022-03-23T00:02:04.887000",
      "created": "2022-02-21T21:10:16.849000",
      "tags": [
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "solutions",
        "llc creation",
        "date",
        "categories",
        "ranks rank",
        "value ingestion",
        "time majestic",
        "umbrella",
        "masking enabled",
        "win32 exe",
        "server",
        "email",
        "registrar abuse",
        "practice",
        "gre premium",
        "code",
        "registrar url",
        "score"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 14286,
        "hostname": 3051,
        "domain": 1501,
        "FileHash-SHA256": 524,
        "CVE": 2,
        "email": 3,
        "FileHash-SHA1": 12
      },
      "indicator_count": 19379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 406,
      "modified_text": "1489 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "61e2733e9e57250b5725ab5a",
      "name": "TrueCar.com",
      "description": "",
      "modified": "2022-02-14T00:00:26.279000",
      "created": "2022-01-15T07:09:50.416000",
      "tags": [
        "android",
        "win32 exe",
        "key identifier",
        "win32 dll",
        "x509v3 subject",
        "server",
        "date",
        "registrar abuse",
        "algorithm",
        "markmonitor",
        "format",
        "impact",
        "first",
        "text",
        "email",
        "type name",
        "portable",
        "adguard premium",
        "usus",
        "mozilla firefox",
        "technology",
        "microsoft",
        "security",
        "subdomains",
        "threatseeker",
        "sophos",
        "comodo valkyrie",
        "verdict mobile",
        "rank value",
        "ingestion time",
        "statvoo",
        "cisco umbrella",
        "dns records",
        "record type",
        "ttl value",
        "msms94514764",
        "data",
        "v3 serial",
        "number",
        "issuer",
        "cus cnamazon",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "domain status",
        "contact phone",
        "registrar",
        "ca creation",
        "dnssec",
        "domain name",
        "us registrant",
        "links https",
        "path",
        "submission",
        "httponly",
        "expiressat",
        "samesitelax",
        "details links",
        "vehicles comodo",
        "history first",
        "analysis"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 17071,
        "hostname": 4203,
        "FileHash-SHA256": 1156,
        "domain": 4253,
        "FileHash-MD5": 13,
        "FileHash-SHA1": 5,
        "email": 1
      },
      "indicator_count": 26702,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 412,
      "modified_text": "1526 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "entrustdatacard.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "entrustdatacard.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776670652.455735
}