{
  "type": "Domain",
  "indicator": "ex-dev.net",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/ex-dev.net",
    "alexa": "http://www.alexa.com/siteinfo/ex-dev.net",
    "indicator": "ex-dev.net",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3784686463,
      "indicator": "ex-dev.net",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "6992bae83a5988dff8311490",
          "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
          "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
          "modified": "2026-04-13T23:46:20.071000",
          "created": "2026-02-16T06:36:24.788000",
          "tags": [
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
            "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#PotentialUS-Origin_FalseFlag_Obfuscation"
          ],
          "references": [
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
            "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
            "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
            "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
            "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
            "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
            "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
            "",
            "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
            "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
            "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
            "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
            "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
            "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
            "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
            "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
            "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
            "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
            "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
            "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
          ],
          "public": 1,
          "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware Family: StealthWorker / GoBrut",
              "display_name": "Malware Family: StealthWorker / GoBrut",
              "target": "/malware/Malware Family: StealthWorker / GoBrut"
            },
            {
              "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2166,
            "FileHash-SHA1": 2067,
            "FileHash-SHA256": 3371,
            "domain": 13295,
            "URL": 6860,
            "email": 272,
            "hostname": 4705,
            "SSLCertFingerprint": 268,
            "CVE": 107,
            "CIDR": 6
          },
          "indicator_count": 33117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "6 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66762a4ccb10185d774ddbde",
          "name": "Lazarus Group - Emotet | Sony Music",
          "description": "Is the Lazarus Group still attacking Sony Music, affiliated, former, contacts, aspiring prospects and independent artists?\n\nA Denver Studio owner had former Sony leadership role was fully infected with Pegasus, Mirai and  a Lazarus Group affiliation seen. An independent Denver publishing company and artists were greatly targeted and continue to be. A songwriter known to have recorded at Denver Studio had songs pirated. Tori Kelly and Justin Bieber recorded over chops copy written by artist. Strangely legally affiliated. A rumor suggests Lazarus group & Anonymous are hacker made up of government employees, police officers, attorneys and PI's. The government affiliated IP's are give rumors some weight. Hackers will hack anything, \nMost popular beliefs are artist was targeted and therefore the studio where she target worked from often. Denver Studio report scrubbed by HistoryKillerPro & other Unknown Stealers.",
          "modified": "2024-07-22T01:04:09.406000",
          "created": "2024-06-22T01:35:08.834000",
          "tags": [
            "url https",
            "url http",
            "active related",
            "pulses hostname",
            "ipv4",
            "showing",
            "entries",
            "active",
            "passive dns",
            "as2527 sony",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "location chiba",
            "united",
            "unknown",
            "date",
            "moved",
            "search",
            "gmt content",
            "domain",
            "body",
            "encrypt",
            "as58061 scalaxy",
            "asn as58061",
            "dns resolutions",
            "expiration",
            "no expiration",
            "hostname",
            "iocs",
            "filehashsha256",
            "scan endpoints",
            "next",
            "report spam",
            "lazarus created",
            "minutes ago",
            "amber tags",
            "filehashsha1",
            "group",
            "tip oriented",
            "threat research",
            "android10",
            "type indicator",
            "role title",
            "creation date",
            "emails",
            "pulse submit",
            "url analysis",
            "germany unknown",
            "aaaa",
            "cname",
            "as209453 gandi",
            "as209453",
            "france unknown",
            "ireland unknown",
            "susp",
            "backdoor",
            "win32",
            "meta",
            "cookie",
            "pragma",
            "open ports",
            "as20940",
            "status",
            "certificate",
            "rsa sha256",
            "record value",
            "historical ssl",
            "referrer",
            "collection",
            "vt graph",
            "glaxosmithkline",
            "cyber threat",
            "heur",
            "phishing",
            "team",
            "malicious site",
            "control server",
            "coalition",
            "team phishing",
            "engineering",
            "emotet",
            "malware",
            "malicious",
            "download",
            "cobalt strike",
            "binder",
            "dropper",
            "formbook",
            "facebook",
            "artemis",
            "azorult",
            "bank",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "hostnames",
            "detection list",
            "blacklist",
            "a domains",
            "bitdefender",
            "leader",
            "as15133 verizon",
            "melbourne it",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "headers date",
            "gmt contenttype",
            "connection",
            "ip address",
            "web redirection",
            "sha1",
            "ascii text",
            "sha256",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "hybrid",
            "starfield",
            "format",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "loki"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
            "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
            "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
            "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
            "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
            "Server: Web redirection - http://loki.com/download",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
          ],
          "public": 1,
          "adversary": "Lazarus Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Win.Trojan.DarkKomet-1",
              "display_name": "Win.Trojan.DarkKomet-1",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject",
              "display_name": "VirTool:Win32/CeeInject",
              "target": "/malware/VirTool:Win32/CeeInject"
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "Win32:Evo-gen",
              "display_name": "Win32:Evo-gen",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3528,
            "domain": 1453,
            "hostname": 1542,
            "FileHash-SHA256": 757,
            "FileHash-SHA1": 66,
            "FileHash-MD5": 79,
            "email": 5,
            "CVE": 4,
            "SSLCertFingerprint": 14
          },
          "indicator_count": 7448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "636 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "667648f0bc130bdaa294ea19",
          "name": "Sony Music | Emotet  - Lazarus Affiliated",
          "description": "",
          "modified": "2024-07-22T01:04:09.406000",
          "created": "2024-06-22T03:45:52.401000",
          "tags": [
            "url https",
            "url http",
            "active related",
            "pulses hostname",
            "ipv4",
            "showing",
            "entries",
            "active",
            "passive dns",
            "as2527 sony",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "location chiba",
            "united",
            "unknown",
            "date",
            "moved",
            "search",
            "gmt content",
            "domain",
            "body",
            "encrypt",
            "as58061 scalaxy",
            "asn as58061",
            "dns resolutions",
            "expiration",
            "no expiration",
            "hostname",
            "iocs",
            "filehashsha256",
            "scan endpoints",
            "next",
            "report spam",
            "lazarus created",
            "minutes ago",
            "amber tags",
            "filehashsha1",
            "group",
            "tip oriented",
            "threat research",
            "android10",
            "type indicator",
            "role title",
            "creation date",
            "emails",
            "pulse submit",
            "url analysis",
            "germany unknown",
            "aaaa",
            "cname",
            "as209453 gandi",
            "as209453",
            "france unknown",
            "ireland unknown",
            "susp",
            "backdoor",
            "win32",
            "meta",
            "cookie",
            "pragma",
            "open ports",
            "as20940",
            "status",
            "certificate",
            "rsa sha256",
            "record value",
            "historical ssl",
            "referrer",
            "collection",
            "vt graph",
            "glaxosmithkline",
            "cyber threat",
            "heur",
            "phishing",
            "team",
            "malicious site",
            "control server",
            "coalition",
            "team phishing",
            "engineering",
            "emotet",
            "malware",
            "malicious",
            "download",
            "cobalt strike",
            "binder",
            "dropper",
            "formbook",
            "facebook",
            "artemis",
            "azorult",
            "bank",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "hostnames",
            "detection list",
            "blacklist",
            "a domains",
            "bitdefender",
            "leader",
            "as15133 verizon",
            "melbourne it",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "headers date",
            "gmt contenttype",
            "connection",
            "ip address",
            "web redirection",
            "sha1",
            "ascii text",
            "sha256",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "hybrid",
            "starfield",
            "format",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "loki"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
            "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
            "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
            "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
            "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
            "Server: Web redirection - http://loki.com/download",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
          ],
          "public": 1,
          "adversary": "Lazarus Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Win.Trojan.DarkKomet-1",
              "display_name": "Win.Trojan.DarkKomet-1",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject",
              "display_name": "VirTool:Win32/CeeInject",
              "target": "/malware/VirTool:Win32/CeeInject"
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "Win32:Evo-gen",
              "display_name": "Win32:Evo-gen",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": "66762a4ccb10185d774ddbde",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3528,
            "domain": 1453,
            "hostname": 1542,
            "FileHash-SHA256": 757,
            "FileHash-SHA1": 66,
            "FileHash-MD5": 79,
            "email": 5,
            "CVE": 4,
            "SSLCertFingerprint": 14
          },
          "indicator_count": 7448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "636 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6681f340f8c0223ae0ce199d",
          "name": "Bitdefender Ransomware| | Sony Music |  Lazarus Affiliated",
          "description": "",
          "modified": "2024-07-22T01:04:09.406000",
          "created": "2024-07-01T00:07:28.402000",
          "tags": [
            "url https",
            "url http",
            "active related",
            "pulses hostname",
            "ipv4",
            "showing",
            "entries",
            "active",
            "passive dns",
            "as2527 sony",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "location chiba",
            "united",
            "unknown",
            "date",
            "moved",
            "search",
            "gmt content",
            "domain",
            "body",
            "encrypt",
            "as58061 scalaxy",
            "asn as58061",
            "dns resolutions",
            "expiration",
            "no expiration",
            "hostname",
            "iocs",
            "filehashsha256",
            "scan endpoints",
            "next",
            "report spam",
            "lazarus created",
            "minutes ago",
            "amber tags",
            "filehashsha1",
            "group",
            "tip oriented",
            "threat research",
            "android10",
            "type indicator",
            "role title",
            "creation date",
            "emails",
            "pulse submit",
            "url analysis",
            "germany unknown",
            "aaaa",
            "cname",
            "as209453 gandi",
            "as209453",
            "france unknown",
            "ireland unknown",
            "susp",
            "backdoor",
            "win32",
            "meta",
            "cookie",
            "pragma",
            "open ports",
            "as20940",
            "status",
            "certificate",
            "rsa sha256",
            "record value",
            "historical ssl",
            "referrer",
            "collection",
            "vt graph",
            "glaxosmithkline",
            "cyber threat",
            "heur",
            "phishing",
            "team",
            "malicious site",
            "control server",
            "coalition",
            "team phishing",
            "engineering",
            "emotet",
            "malware",
            "malicious",
            "download",
            "cobalt strike",
            "binder",
            "dropper",
            "formbook",
            "facebook",
            "artemis",
            "azorult",
            "bank",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "hostnames",
            "detection list",
            "blacklist",
            "a domains",
            "bitdefender",
            "leader",
            "as15133 verizon",
            "melbourne it",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "headers date",
            "gmt contenttype",
            "connection",
            "ip address",
            "web redirection",
            "sha1",
            "ascii text",
            "sha256",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "hybrid",
            "starfield",
            "format",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "loki"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
            "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
            "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
            "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
            "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
            "Server: Web redirection - http://loki.com/download",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
            "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
          ],
          "public": 1,
          "adversary": "Lazarus Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Win.Trojan.DarkKomet-1",
              "display_name": "Win.Trojan.DarkKomet-1",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject",
              "display_name": "VirTool:Win32/CeeInject",
              "target": "/malware/VirTool:Win32/CeeInject"
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "Win32:Evo-gen",
              "display_name": "Win32:Evo-gen",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": "667648f0bc130bdaa294ea19",
          "export_count": 6847,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3528,
            "domain": 1453,
            "hostname": 1542,
            "FileHash-SHA256": 757,
            "FileHash-SHA1": 66,
            "FileHash-MD5": 79,
            "email": 5,
            "CVE": 4,
            "SSLCertFingerprint": 14
          },
          "indicator_count": 7448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "636 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655dafbe9ac9ac786fde45ad",
          "name": "http://malwaredomainlist.com/ \u2022 CNC \u2022 Spyware \u2022 Tracking",
          "description": "Network capture, dga domain, ecc domain, data collection, voicemail access, mail spammer, registrar abuse\n\n[Auto populated. I can't cannot confirm or deny the accuracy of the following information: A summary of key facts and information about a malicious web domain, hosted by the US government, has been released by Google.com and its parent company, Alphabet, for use on its website.]",
          "modified": "2023-12-22T06:03:01.993000",
          "created": "2023-11-22T07:37:34.595000",
          "tags": [
            "united",
            "as22612",
            "as2637",
            "creation date",
            "search",
            "moved",
            "expiration date",
            "date",
            "showing",
            "as397240",
            "next",
            "entries",
            "scan endpoints",
            "all octoseek",
            "dns replication",
            "win32 exe",
            "network capture",
            "android",
            "android adaway",
            "html",
            "files",
            "detections type",
            "name",
            "office open",
            "xml document",
            "namecheap",
            "namecheap inc",
            "whois lookups",
            "win32 dll",
            "text",
            "wextract",
            "text htaccess",
            "powershell",
            "detection list",
            "blacklist",
            "first",
            "ssl certificate",
            "whois record",
            "contacted",
            "december",
            "whois whois",
            "threat roundup",
            "historical ssl",
            "problems",
            "referrer",
            "pe resource",
            "startpage",
            "cyber threat",
            "redline stealer",
            "mail spammer",
            "hostname",
            "phishing site",
            "malicious site",
            "installcore",
            "http spammer",
            "malware site",
            "malware",
            "generic malware",
            "heur",
            "generic",
            "alexa top",
            "million",
            "site",
            "cisco umbrella",
            "alexa",
            "ip address",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cat cnzerossl",
            "ecc domain",
            "secure site",
            "ca ozerossl",
            "validity",
            "subject public",
            "server",
            "email",
            "code",
            "registrar abuse",
            "country",
            "privacy service",
            "withheld",
            "privacy",
            "domain name",
            "pattern match",
            "ascii text",
            "appdata",
            "file",
            "windows nt",
            "svg scalable",
            "vector graphics",
            "indicator",
            "gif image",
            "accept",
            "hybrid",
            "general",
            "local",
            "pixel",
            "click",
            "twitter",
            "strings",
            "class",
            "generator",
            "critical",
            "command_and_control",
            "spyware",
            "tracking",
            "voicemail access",
            "dga",
            "apple"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/c0c84df54b890bb408fc2289f1e75a29991127bbe207aa30042616b5ea150342/655d9af5679c7afcc409895e",
            "\u2193Interesting\u2193",
            "IPv4 198.54.117.211 command_and_control",
            "IPv4 198.54.117.210 command_and_control",
            "IPv4 198.54.117.212 command_and_control",
            "IPv4 198.54.117.215 command_and_control",
            "IPv4 198.54.117.217 command_and_control",
            "IPv4 198.54.117.218 command_and_control",
            "apple-securityiphone-icloud.com",
            "tx-p2p-pull.video-voip.com.dorm.com",
            "http://updates.voicemailaccess.net/b0f6a00b15311023",
            "tvapp-server.de",
            "zeustracker.abuse.ch",
            "ransomwaretracker.abuse.ch",
            "http://t.trkitok.com/track/rep?oid=2001&st=1&id=DP2441--w1VJE427J8SGGRTP02MD7UEG___93737493-c08b-4dc7-ad30-b17a2c09e771___$mid",
            "louisianarooflawyers.com         [phishing]",
            "hasownproperty.call"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 105,
            "FileHash-SHA1": 100,
            "FileHash-SHA256": 3072,
            "domain": 1188,
            "email": 5,
            "URL": 7940,
            "hostname": 1925,
            "CVE": 1
          },
          "indicator_count": 14336,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "apple-securityiphone-icloud.com",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "hasownproperty.call",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
        "IPv4 198.54.117.217 command_and_control",
        "IPv4 198.54.117.218 command_and_control",
        "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "louisianarooflawyers.com         [phishing]",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "IPv4 198.54.117.215 command_and_control",
        "zeustracker.abuse.ch",
        "IPv4 198.54.117.210 command_and_control",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "Server: Web redirection - http://loki.com/download",
        "IPv4 198.54.117.212 command_and_control",
        "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "tx-p2p-pull.video-voip.com.dorm.com",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset.",
        "T1110.001 (Brute Force: Password Guessing)",
        "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
        "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
        "\u2193Interesting\u2193",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "http://t.trkitok.com/track/rep?oid=2001&st=1&id=DP2441--w1VJE427J8SGGRTP02MD7UEG___93737493-c08b-4dc7-ad30-b17a2c09e771___$mid",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "https://www.hybrid-analysis.com/sample/c0c84df54b890bb408fc2289f1e75a29991127bbe207aa30042616b5ea150342/655d9af5679c7afcc409895e",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
        "tvapp-server.de",
        "http://updates.voicemailaccess.net/b0f6a00b15311023",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "IPv4 198.54.117.211 command_and_control",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "ransomwaretracker.abuse.ch"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
            "Lazarus Group"
          ],
          "malware_families": [
            "Installcore",
            "Win32:evo-gen",
            "Win.trojan.darkkomet-1",
            "Blacknet",
            "Mirai",
            "Backdoor:msil/bladabindi",
            "Generic",
            "Malware family: stealthworker / gobrut",
            "Win32:evo-gen\\ [susp]",
            "Virtool:win32/ceeinject",
            "Md5 hash: f8add7e7161460ea2b1970cf4ca535bf"
          ],
          "industries": [
            "Technology",
            "Media",
            "Entertainment"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "6992bae83a5988dff8311490",
      "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
      "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
      "modified": "2026-04-13T23:46:20.071000",
      "created": "2026-02-16T06:36:24.788000",
      "tags": [
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
        "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
        "#PotentialUS-Origin_FalseFlag_Obfuscation"
      ],
      "references": [
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
      ],
      "public": 1,
      "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware Family: StealthWorker / GoBrut",
          "display_name": "Malware Family: StealthWorker / GoBrut",
          "target": "/malware/Malware Family: StealthWorker / GoBrut"
        },
        {
          "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2166,
        "FileHash-SHA1": 2067,
        "FileHash-SHA256": 3371,
        "domain": 13295,
        "URL": 6860,
        "email": 272,
        "hostname": 4705,
        "SSLCertFingerprint": 268,
        "CVE": 107,
        "CIDR": 6
      },
      "indicator_count": 33117,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 62,
      "modified_text": "6 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66762a4ccb10185d774ddbde",
      "name": "Lazarus Group - Emotet | Sony Music",
      "description": "Is the Lazarus Group still attacking Sony Music, affiliated, former, contacts, aspiring prospects and independent artists?\n\nA Denver Studio owner had former Sony leadership role was fully infected with Pegasus, Mirai and  a Lazarus Group affiliation seen. An independent Denver publishing company and artists were greatly targeted and continue to be. A songwriter known to have recorded at Denver Studio had songs pirated. Tori Kelly and Justin Bieber recorded over chops copy written by artist. Strangely legally affiliated. A rumor suggests Lazarus group & Anonymous are hacker made up of government employees, police officers, attorneys and PI's. The government affiliated IP's are give rumors some weight. Hackers will hack anything, \nMost popular beliefs are artist was targeted and therefore the studio where she target worked from often. Denver Studio report scrubbed by HistoryKillerPro & other Unknown Stealers.",
      "modified": "2024-07-22T01:04:09.406000",
      "created": "2024-06-22T01:35:08.834000",
      "tags": [
        "url https",
        "url http",
        "active related",
        "pulses hostname",
        "ipv4",
        "showing",
        "entries",
        "active",
        "passive dns",
        "as2527 sony",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "location chiba",
        "united",
        "unknown",
        "date",
        "moved",
        "search",
        "gmt content",
        "domain",
        "body",
        "encrypt",
        "as58061 scalaxy",
        "asn as58061",
        "dns resolutions",
        "expiration",
        "no expiration",
        "hostname",
        "iocs",
        "filehashsha256",
        "scan endpoints",
        "next",
        "report spam",
        "lazarus created",
        "minutes ago",
        "amber tags",
        "filehashsha1",
        "group",
        "tip oriented",
        "threat research",
        "android10",
        "type indicator",
        "role title",
        "creation date",
        "emails",
        "pulse submit",
        "url analysis",
        "germany unknown",
        "aaaa",
        "cname",
        "as209453 gandi",
        "as209453",
        "france unknown",
        "ireland unknown",
        "susp",
        "backdoor",
        "win32",
        "meta",
        "cookie",
        "pragma",
        "open ports",
        "as20940",
        "status",
        "certificate",
        "rsa sha256",
        "record value",
        "historical ssl",
        "referrer",
        "collection",
        "vt graph",
        "glaxosmithkline",
        "cyber threat",
        "heur",
        "phishing",
        "team",
        "malicious site",
        "control server",
        "coalition",
        "team phishing",
        "engineering",
        "emotet",
        "malware",
        "malicious",
        "download",
        "cobalt strike",
        "binder",
        "dropper",
        "formbook",
        "facebook",
        "artemis",
        "azorult",
        "bank",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "hostnames",
        "detection list",
        "blacklist",
        "a domains",
        "bitdefender",
        "leader",
        "as15133 verizon",
        "melbourne it",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "headers date",
        "gmt contenttype",
        "connection",
        "ip address",
        "web redirection",
        "sha1",
        "ascii text",
        "sha256",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "hybrid",
        "starfield",
        "format",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "loki"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
        "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
        "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
        "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
        "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
        "Server: Web redirection - http://loki.com/download",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
      ],
      "public": 1,
      "adversary": "Lazarus Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Win.Trojan.DarkKomet-1",
          "display_name": "Win.Trojan.DarkKomet-1",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject",
          "display_name": "VirTool:Win32/CeeInject",
          "target": "/malware/VirTool:Win32/CeeInject"
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "Win32:Evo-gen",
          "display_name": "Win32:Evo-gen",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology",
        "Media"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 50,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3528,
        "domain": 1453,
        "hostname": 1542,
        "FileHash-SHA256": 757,
        "FileHash-SHA1": 66,
        "FileHash-MD5": 79,
        "email": 5,
        "CVE": 4,
        "SSLCertFingerprint": 14
      },
      "indicator_count": 7448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "636 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "667648f0bc130bdaa294ea19",
      "name": "Sony Music | Emotet  - Lazarus Affiliated",
      "description": "",
      "modified": "2024-07-22T01:04:09.406000",
      "created": "2024-06-22T03:45:52.401000",
      "tags": [
        "url https",
        "url http",
        "active related",
        "pulses hostname",
        "ipv4",
        "showing",
        "entries",
        "active",
        "passive dns",
        "as2527 sony",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "location chiba",
        "united",
        "unknown",
        "date",
        "moved",
        "search",
        "gmt content",
        "domain",
        "body",
        "encrypt",
        "as58061 scalaxy",
        "asn as58061",
        "dns resolutions",
        "expiration",
        "no expiration",
        "hostname",
        "iocs",
        "filehashsha256",
        "scan endpoints",
        "next",
        "report spam",
        "lazarus created",
        "minutes ago",
        "amber tags",
        "filehashsha1",
        "group",
        "tip oriented",
        "threat research",
        "android10",
        "type indicator",
        "role title",
        "creation date",
        "emails",
        "pulse submit",
        "url analysis",
        "germany unknown",
        "aaaa",
        "cname",
        "as209453 gandi",
        "as209453",
        "france unknown",
        "ireland unknown",
        "susp",
        "backdoor",
        "win32",
        "meta",
        "cookie",
        "pragma",
        "open ports",
        "as20940",
        "status",
        "certificate",
        "rsa sha256",
        "record value",
        "historical ssl",
        "referrer",
        "collection",
        "vt graph",
        "glaxosmithkline",
        "cyber threat",
        "heur",
        "phishing",
        "team",
        "malicious site",
        "control server",
        "coalition",
        "team phishing",
        "engineering",
        "emotet",
        "malware",
        "malicious",
        "download",
        "cobalt strike",
        "binder",
        "dropper",
        "formbook",
        "facebook",
        "artemis",
        "azorult",
        "bank",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "hostnames",
        "detection list",
        "blacklist",
        "a domains",
        "bitdefender",
        "leader",
        "as15133 verizon",
        "melbourne it",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "headers date",
        "gmt contenttype",
        "connection",
        "ip address",
        "web redirection",
        "sha1",
        "ascii text",
        "sha256",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "hybrid",
        "starfield",
        "format",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "loki"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
        "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
        "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
        "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
        "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
        "Server: Web redirection - http://loki.com/download",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
      ],
      "public": 1,
      "adversary": "Lazarus Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Win.Trojan.DarkKomet-1",
          "display_name": "Win.Trojan.DarkKomet-1",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject",
          "display_name": "VirTool:Win32/CeeInject",
          "target": "/malware/VirTool:Win32/CeeInject"
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "Win32:Evo-gen",
          "display_name": "Win32:Evo-gen",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology",
        "Media"
      ],
      "TLP": "green",
      "cloned_from": "66762a4ccb10185d774ddbde",
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3528,
        "domain": 1453,
        "hostname": 1542,
        "FileHash-SHA256": 757,
        "FileHash-SHA1": 66,
        "FileHash-MD5": 79,
        "email": 5,
        "CVE": 4,
        "SSLCertFingerprint": 14
      },
      "indicator_count": 7448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "636 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6681f340f8c0223ae0ce199d",
      "name": "Bitdefender Ransomware| | Sony Music |  Lazarus Affiliated",
      "description": "",
      "modified": "2024-07-22T01:04:09.406000",
      "created": "2024-07-01T00:07:28.402000",
      "tags": [
        "url https",
        "url http",
        "active related",
        "pulses hostname",
        "ipv4",
        "showing",
        "entries",
        "active",
        "passive dns",
        "as2527 sony",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "location chiba",
        "united",
        "unknown",
        "date",
        "moved",
        "search",
        "gmt content",
        "domain",
        "body",
        "encrypt",
        "as58061 scalaxy",
        "asn as58061",
        "dns resolutions",
        "expiration",
        "no expiration",
        "hostname",
        "iocs",
        "filehashsha256",
        "scan endpoints",
        "next",
        "report spam",
        "lazarus created",
        "minutes ago",
        "amber tags",
        "filehashsha1",
        "group",
        "tip oriented",
        "threat research",
        "android10",
        "type indicator",
        "role title",
        "creation date",
        "emails",
        "pulse submit",
        "url analysis",
        "germany unknown",
        "aaaa",
        "cname",
        "as209453 gandi",
        "as209453",
        "france unknown",
        "ireland unknown",
        "susp",
        "backdoor",
        "win32",
        "meta",
        "cookie",
        "pragma",
        "open ports",
        "as20940",
        "status",
        "certificate",
        "rsa sha256",
        "record value",
        "historical ssl",
        "referrer",
        "collection",
        "vt graph",
        "glaxosmithkline",
        "cyber threat",
        "heur",
        "phishing",
        "team",
        "malicious site",
        "control server",
        "coalition",
        "team phishing",
        "engineering",
        "emotet",
        "malware",
        "malicious",
        "download",
        "cobalt strike",
        "binder",
        "dropper",
        "formbook",
        "facebook",
        "artemis",
        "azorult",
        "bank",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "hostnames",
        "detection list",
        "blacklist",
        "a domains",
        "bitdefender",
        "leader",
        "as15133 verizon",
        "melbourne it",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "headers date",
        "gmt contenttype",
        "connection",
        "ip address",
        "web redirection",
        "sha1",
        "ascii text",
        "sha256",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "hybrid",
        "starfield",
        "format",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "loki"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/url/http://accounts-upadates-informations-services-login-customer-id.marketingplus1.com/itunes",
        "Relationship: Louisiana Cyber Investigators Alliance (LCIA)",
        "https://otx.alienvault.com/indicator/url/http://dashboard.loki.com/files/LokiApplet.jar",
        "Ransomware: https://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage",
        "Emotet: IPv4 104.18.41.100 | IPv4 104.18.45.108",
        "Server: Web redirection - http://loki.com/download",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: https://forms.sonymusicfans.com/campaign/jazmine-sullivan-heaux-tails-pre-save/",
        "Phishing: http://forms.sonymusicfans.com/campaign/old-dominion-newsletter-sign-up/?ss=0"
      ],
      "public": 1,
      "adversary": "Lazarus Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Win.Trojan.DarkKomet-1",
          "display_name": "Win.Trojan.DarkKomet-1",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject",
          "display_name": "VirTool:Win32/CeeInject",
          "target": "/malware/VirTool:Win32/CeeInject"
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "Win32:Evo-gen",
          "display_name": "Win32:Evo-gen",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology",
        "Media"
      ],
      "TLP": "green",
      "cloned_from": "667648f0bc130bdaa294ea19",
      "export_count": 6847,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3528,
        "domain": 1453,
        "hostname": 1542,
        "FileHash-SHA256": 757,
        "FileHash-SHA1": 66,
        "FileHash-MD5": 79,
        "email": 5,
        "CVE": 4,
        "SSLCertFingerprint": 14
      },
      "indicator_count": 7448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "636 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "655dafbe9ac9ac786fde45ad",
      "name": "http://malwaredomainlist.com/ \u2022 CNC \u2022 Spyware \u2022 Tracking",
      "description": "Network capture, dga domain, ecc domain, data collection, voicemail access, mail spammer, registrar abuse\n\n[Auto populated. I can't cannot confirm or deny the accuracy of the following information: A summary of key facts and information about a malicious web domain, hosted by the US government, has been released by Google.com and its parent company, Alphabet, for use on its website.]",
      "modified": "2023-12-22T06:03:01.993000",
      "created": "2023-11-22T07:37:34.595000",
      "tags": [
        "united",
        "as22612",
        "as2637",
        "creation date",
        "search",
        "moved",
        "expiration date",
        "date",
        "showing",
        "as397240",
        "next",
        "entries",
        "scan endpoints",
        "all octoseek",
        "dns replication",
        "win32 exe",
        "network capture",
        "android",
        "android adaway",
        "html",
        "files",
        "detections type",
        "name",
        "office open",
        "xml document",
        "namecheap",
        "namecheap inc",
        "whois lookups",
        "win32 dll",
        "text",
        "wextract",
        "text htaccess",
        "powershell",
        "detection list",
        "blacklist",
        "first",
        "ssl certificate",
        "whois record",
        "contacted",
        "december",
        "whois whois",
        "threat roundup",
        "historical ssl",
        "problems",
        "referrer",
        "pe resource",
        "startpage",
        "cyber threat",
        "redline stealer",
        "mail spammer",
        "hostname",
        "phishing site",
        "malicious site",
        "installcore",
        "http spammer",
        "malware site",
        "malware",
        "generic malware",
        "heur",
        "generic",
        "alexa top",
        "million",
        "site",
        "cisco umbrella",
        "alexa",
        "ip address",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cat cnzerossl",
        "ecc domain",
        "secure site",
        "ca ozerossl",
        "validity",
        "subject public",
        "server",
        "email",
        "code",
        "registrar abuse",
        "country",
        "privacy service",
        "withheld",
        "privacy",
        "domain name",
        "pattern match",
        "ascii text",
        "appdata",
        "file",
        "windows nt",
        "svg scalable",
        "vector graphics",
        "indicator",
        "gif image",
        "accept",
        "hybrid",
        "general",
        "local",
        "pixel",
        "click",
        "twitter",
        "strings",
        "class",
        "generator",
        "critical",
        "command_and_control",
        "spyware",
        "tracking",
        "voicemail access",
        "dga",
        "apple"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/c0c84df54b890bb408fc2289f1e75a29991127bbe207aa30042616b5ea150342/655d9af5679c7afcc409895e",
        "\u2193Interesting\u2193",
        "IPv4 198.54.117.211 command_and_control",
        "IPv4 198.54.117.210 command_and_control",
        "IPv4 198.54.117.212 command_and_control",
        "IPv4 198.54.117.215 command_and_control",
        "IPv4 198.54.117.217 command_and_control",
        "IPv4 198.54.117.218 command_and_control",
        "apple-securityiphone-icloud.com",
        "tx-p2p-pull.video-voip.com.dorm.com",
        "http://updates.voicemailaccess.net/b0f6a00b15311023",
        "tvapp-server.de",
        "zeustracker.abuse.ch",
        "ransomwaretracker.abuse.ch",
        "http://t.trkitok.com/track/rep?oid=2001&st=1&id=DP2441--w1VJE427J8SGGRTP02MD7UEG___93737493-c08b-4dc7-ad30-b17a2c09e771___$mid",
        "louisianarooflawyers.com         [phishing]",
        "hasownproperty.call"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 105,
        "FileHash-SHA1": 100,
        "FileHash-SHA256": 3072,
        "domain": 1188,
        "email": 5,
        "URL": 7940,
        "hostname": 1925,
        "CVE": 1
      },
      "indicator_count": 14336,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "849 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "ex-dev.net",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "ex-dev.net",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642429.0992153
}