{
  "type": "Domain",
  "indicator": "fdpellets.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/fdpellets.com",
    "alexa": "http://www.alexa.com/siteinfo/fdpellets.com",
    "indicator": "fdpellets.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3258048531,
      "indicator": "fdpellets.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69a6667cc81826a4ae1dd3ea",
          "name": "dropbox.com",
          "description": "Verdict\nWhitelisted\nIP Address\n162.125.248.18\nLocation\n\nUnited States\nASN\nAS19679 dropbox inc.\nNameservers\nns-1949.awsdns-51.co.uk.\n, \nns-315.awsdns-39.com.\nMore\nWHOIS\nRegistrar:\nMarkMonitor, Inc.,  \nCreation Date:\nJun 27, 1995\nRelated Pulses\nOTX User-Created Pulses (50)\nRelated Tags\n1747 Related Tags\n320700\n, \n368600\n, \n1575038779\n, \ngeoip\n, \nas54113\nMore\nIndicator Facts\n997 malicious files communicating\nHistorical OTX telemetry\nRunning webserver\n105 subdomains\nFilesharing\nSPF record\nPresent in Umbrella\nPresent in Majestic\nPresent in Akamai\nAntivirus Detections\nALF:E5.SpikeAex.DYNHASH\n, \nBackdoor:Win32/Drixed.J\n, \nCan't access file\n, \nTrojan:Win32/Banload.E\n, \nTrojan:Win32/Pariham.A\nMore\nAV Detection Ratio\n997\n / 1000\nExternal Resources\nWhois, \nUrlVoid, \nVirusTotal",
          "modified": "2026-04-02T04:35:49.117000",
          "created": "2026-03-03T04:41:32.619000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 318,
            "FileHash-MD5": 1055,
            "FileHash-SHA1": 1067,
            "FileHash-SHA256": 2018,
            "email": 6,
            "hostname": 210,
            "URL": 371
          },
          "indicator_count": 5045,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 52,
          "modified_text": "17 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "692e068ff95076bb8e75bd9f",
          "name": "Telehealth Exploit",
          "description": "",
          "modified": "2025-12-31T21:02:25",
          "created": "2025-12-01T21:20:15.043000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "safe browsing",
            "present dec",
            "status",
            "date",
            "united",
            "name servers",
            "netherlands",
            "unknown ns",
            "ip address",
            "search",
            "showing",
            "local",
            "data upload",
            "extraction",
            "flag",
            "bad traffic",
            "et hunting",
            "domain m2",
            "suspicious tls",
            "sni request",
            "windir",
            "openurl c",
            "dns requests",
            "et info",
            "tls handshake",
            "prefetch2",
            "analysis",
            "tor analysis",
            "domain address",
            "tlsv1",
            "jfif",
            "jpeg image",
            "ascii text",
            "entries",
            "as15169",
            "show",
            "read c",
            "write",
            "next",
            "persistence",
            "execution",
            "crash",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 555,
            "URL": 1803,
            "FileHash-SHA256": 1437,
            "FileHash-MD5": 113,
            "FileHash-SHA1": 13,
            "email": 4,
            "SSLCertFingerprint": 18,
            "CVE": 1
          },
          "indicator_count": 4204,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "108 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69116f89c600907a25e6b397",
          "name": "GoBrut Service Bruter CnC Activity  \u2022 TAM Legal \u2022 Christopher P. Ahmann",
          "description": "Malicious attacks from Special Counsel criminal attorney defending Jeffrey Scott Reimer and Concentra against and on premises vicious SA. Caused grate bodily injury. Christopher P. Ahmann and Hall\nRender (down the street) Palantir has been harassing , working 24/7 at silencing one crime victim. I\u2019m sure there are more because we thwarted an attempt in 2018. \n\nHitman hired. You couldn\u2019t believe manpower and cyber attacks one family has been through. They attack the Large Loss clients.",
          "modified": "2025-12-10T04:02:00.145000",
          "created": "2025-11-10T04:52:25.542000",
          "tags": [
            "united",
            "ipv4",
            "america asn",
            "asn as397241",
            "neustar",
            "united states",
            "ubuntu",
            "linux x8664",
            "gobrut service",
            "bruter cnc",
            "activity",
            "malware",
            "present mar",
            "present oct",
            "present jun",
            "brazil",
            "present jul",
            "present feb",
            "present nov",
            "moved",
            "a domains",
            "win64",
            "alfper",
            "ransom",
            "script urls",
            "bank",
            "trojan",
            "win32",
            "meta",
            "path",
            "read c",
            "port",
            "destination",
            "delete",
            "write",
            "persistence",
            "execution",
            "generic",
            "hostile",
            "cookie",
            "suspicious",
            "e ee",
            "epeq",
            "efjeg",
            "eebe",
            "e ge",
            "eveoe6ee",
            "elem",
            "e ie",
            "eieeieeie",
            "jea ebjecedjee",
            "ipv4 add",
            "files",
            "reverse dns",
            "america flag",
            "msie",
            "chrome",
            "title",
            "h1 center",
            "gmt content",
            "unknown ns",
            "ip address",
            "for privacy",
            "icedid",
            "bokbot",
            "united states",
            "div div",
            "link",
            "amazon web",
            "a li",
            "click",
            "span",
            "unknown aaaa",
            "record value",
            "apache x",
            "asn as398101",
            "hosting",
            "twitter",
            "present may",
            "present jan",
            "error",
            "present sep",
            "url analysis",
            "passive dns",
            "urls",
            "less whois",
            "registrar",
            "criminal defense",
            "quasi gov",
            "tam legal",
            "monitored target",
            "p",
            "amazon",
            "apple",
            "japan unknown",
            "license",
            "expiresmon",
            "gmt path",
            "html",
            "tokyo",
            "show",
            "unknown",
            "tracking",
            "germany unknown",
            "bq nov",
            "virtool",
            "germany asn",
            "as47846",
            "cyber attacks",
            "christopher",
            "ahmann",
            "pulse pulses",
            "location united",
            "dns resolutions",
            "domains top",
            "hitmen",
            "hall",
            "hall render",
            "telper",
            "hostname add",
            "pulse submit",
            "domain",
            "files ip",
            "address",
            "yara detections",
            "contacted",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "detections elf",
            "lowfi",
            "entries",
            "win32midia",
            "next associated",
            "trojanclicker",
            "win32ellell jan",
            "date"
          ],
          "references": [
            "Tam Legal \u2022 Christopher P. Ahmann Esq Cyber Criminal",
            "GoBrut Service Bruter CnC Activity",
            "interface.xpacemobilitycloud.com",
            "103.224.182.243 ghdukshop.com lb-182-243.above.comAustraliaCOUNTRYAS133618 trellian pty. limited",
            "http://pornsure.com/ \u2022  http://www.kittipornfiberglass.com/ \u2022  kittipornfiberglass.com \u2022 pornsure.com",
            "http://colorado-realestate-finder.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Linux/Morila",
              "display_name": "TrojanDownloader:Linux/Morila",
              "target": "/malware/TrojanDownloader:Linux/Morila"
            },
            {
              "id": "Gafgyt",
              "display_name": "Gafgyt",
              "target": null
            },
            {
              "id": "ELF:Agent-VW\\ [Trj]",
              "display_name": "ELF:Agent-VW\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:IcedID-E\\ [Bank]",
              "display_name": "Win32:IcedID-E\\ [Bank]",
              "target": null
            },
            {
              "id": "Win64:MalwareX-gen\\ [Trj]",
              "display_name": "Win64:MalwareX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Ransom:Win32/ContiCrypt",
              "display_name": "Ransom:Win32/ContiCrypt",
              "target": "/malware/Ransom:Win32/ContiCrypt"
            },
            {
              "id": "ALFPER:RefLoadApiHash",
              "display_name": "ALFPER:RefLoadApiHash",
              "target": null
            },
            {
              "id": "Win64:CrypterX-gen\\ [Trj]",
              "display_name": "Win64:CrypterX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win64:BotX-gen\\ [Trj]",
              "display_name": "Win64:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Bank",
              "display_name": "Bank",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "AutoRun",
              "display_name": "AutoRun",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-316098",
              "display_name": "Win.Trojan.Agent-316098",
              "target": null
            },
            {
              "id": "virtool:Win32/Injector.gen!BQ",
              "display_name": "virtool:Win32/Injector.gen!BQ",
              "target": "/malware/virtool:Win32/Injector.gen!BQ"
            }
          ],
          "attack_ids": [
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3031,
            "email": 8,
            "hostname": 1840,
            "FileHash-SHA256": 1015,
            "URL": 4792,
            "FileHash-MD5": 441,
            "FileHash-SHA1": 432,
            "SSLCertFingerprint": 9,
            "CVE": 1
          },
          "indicator_count": 11569,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "130 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ee5e9f8cfc5fbc73142660",
          "name": "Gaming Studios - YouTube - MyDoom",
          "description": "",
          "modified": "2025-11-13T12:05:32.283000",
          "created": "2025-10-14T14:30:55.471000",
          "tags": [
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "ipv4",
            "enter source",
            "indicator role",
            "title added",
            "active related",
            "united",
            "present jul",
            "unknown ns",
            "search",
            "for privacy",
            "moved",
            "ip address",
            "encrypt",
            "a domains",
            "script urls",
            "meta",
            "pragma",
            "general full",
            "reverse dns",
            "software",
            "resource",
            "security tls",
            "piscataway",
            "asn20473",
            "asn15169",
            "google",
            "asvultr",
            "portfolio",
            "josh theriault",
            "upei",
            "university",
            "island",
            "roblox",
            "jmt studios",
            "moon engine",
            "android",
            "icpc",
            "north america",
            "qualifier",
            "hello",
            "apache",
            "runner",
            "eric everest",
            "games",
            "cloudflar",
            "amazon02",
            "as autonomous",
            "system",
            "canada",
            "value",
            "domainpath name",
            "cgjerrieegaggq",
            "name value",
            "form",
            "game development",
            "blog",
            "jmt99",
            "developer",
            "event",
            "bullseye",
            "trick or treat",
            "unofficial trick or treat 2014",
            "unofficial trick or treat 2015",
            "egg hunt",
            "gift hunt",
            "hallows quest",
            "studio",
            "experience",
            "fall",
            "january",
            "july",
            "founder",
            "studio head",
            "passive dns",
            "urls",
            "registrar",
            "title",
            "roblox jmt99 \"jmt studios\" \"trick or treat\" \"egg hunt\"",
            "press copyright",
            "contact",
            "privacy policy",
            "safety how",
            "youtube",
            "test",
            "nfl sunday",
            "ticket",
            "google llc",
            "data upload",
            "extraction",
            "failed",
            "files",
            "twitter",
            "variables",
            "cgjjtbieggagla",
            "nid value",
            "expiration date",
            "files ip",
            "dynamicloader",
            "write c",
            "delete c",
            "intel",
            "ms windows",
            "medium",
            "default",
            "write",
            "guard",
            "mozilla",
            "malware",
            "defender",
            "unknown",
            "domains",
            "hashes",
            "url analysis",
            "unknown aaaa",
            "script domains",
            "certificate",
            "game",
            "servers",
            "unofficial",
            "settings",
            "public",
            "endpoints",
            "currently",
            "game servers",
            "current",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "role title",
            "related pulses",
            "domain v",
            "url indicator",
            "nameilname",
            "ascii text",
            "mitre att",
            "ck id",
            "ck matrix",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "pe file",
            "high",
            "yara detections",
            "dynamic",
            "v hostname",
            "se fos",
            "include v",
            "domain url",
            "data",
            "alltypes",
            "win32mydoom oct",
            "trojan",
            "url add",
            "http",
            "related nids",
            "files location",
            "canada flag",
            "canada hostname",
            "canada unknown",
            "canada",
            "present aug",
            "name servers",
            "present sep",
            "aaaa",
            "present oct",
            "crlf line",
            "unicode text",
            "music",
            "suspicious",
            "bricked.wtf",
            "flag united",
            "google safe",
            "domain",
            "address domain",
            "united states",
            "filehashsha256",
            "hostname xn",
            "finland unknown",
            "filehashmd5",
            "indicators hong",
            "kong",
            "south korea",
            "present jun",
            "present mar",
            "present may",
            "olet",
            "cnr12",
            "tlsv1",
            "get updates",
            "upatre",
            "added active",
            "apple",
            "everest",
            "josh paul",
            "upadter",
            "convagent",
            "info stealing",
            "delete service",
            "phishing",
            "fraud",
            "social engineering",
            "gamer",
            "hacker",
            "adversaries",
            "icloud",
            "found",
            "gmt content",
            "error",
            "redacted for",
            "meta http",
            "content",
            "gmt server",
            "france unknown",
            "poland unknown",
            "content type",
            "xml title",
            "hostname add",
            "address",
            "location united",
            "life",
            "century link llc",
            "xfinity",
            "livesex",
            "domain add",
            "users",
            "show",
            "delete",
            "blocked by quad9",
            "showing",
            "record value",
            "location canada",
            "canada asn",
            "accept",
            "cookie",
            "macbook",
            "ipv4 add",
            "america flag",
            "america asn",
            "asn as714",
            "less",
            "woodynet",
            "next associated",
            "status",
            "exclude sugges",
            "ip related",
            "t1027.013"
          ],
          "references": [
            "https://www.jmtstudios.org/farewell/",
            "https://www.youtube.com/channel/UCSYMkiAJcNXbO5-aemTSxvw",
            "graphql.accounts.instagram.disk- cloud.link encrynt lenter source leric everest l Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link showing system",
            "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
            "ConventionEngine_Term_Dropbox \u2022 Dropbox",
            "http://api.jmtstudios.org/",
            "bricked.wtf",
            "ic1-privaterelay.appleid.com \u2022 ic2-privaterelay.appleid.com\t\u2022 ic4-privaterelay.appleid.com",
            "http://apple-carry-relay.fastly-edge.com \u2022 appleid.com \u2022 charterhomeschoolacademy.appleid.com",
            "careersandenterprise.appleid.com \u2022 http://apple.appleid.com/",
            "https://forwardemail.net/es/blog/open-source/apple-email-clients",
            "accounts.instagram.disk-cloud.link \u2022\tgraphql.accounts.instagram.disk-cloud",
            "http://mc.yandex-team.settings.storage-cloud.link/ \u2022 ru.disk-cloud.link",
            "http://www.visitbooker.com/Dropbox-07/index.htm",
            "dash.ocrobot.com \u2022 robottherobot.com \u2022http://www.robottherobot.com/",
            "Appears to be closely associated with  close relative and initial victim of attack.",
            "Potentially disturbing , personal , invasive, aggressive, intimate behavior of party."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Hong Kong",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Convagent-9981433-0",
              "display_name": "Win.Malware.Convagent-9981433-0",
              "target": null
            },
            {
              "id": "Upadter",
              "display_name": "Upadter",
              "target": null
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6996,
            "FileHash-MD5": 281,
            "FileHash-SHA1": 220,
            "FileHash-SHA256": 2673,
            "domain": 1747,
            "email": 24,
            "hostname": 2803,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 14747,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ee5ea4d51d4a1cabdb4ee9",
          "name": "Gaming Studios - YouTube - MyDoom",
          "description": "",
          "modified": "2025-11-13T12:05:32.283000",
          "created": "2025-10-14T14:31:00.172000",
          "tags": [
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "ipv4",
            "enter source",
            "indicator role",
            "title added",
            "active related",
            "united",
            "present jul",
            "unknown ns",
            "search",
            "for privacy",
            "moved",
            "ip address",
            "encrypt",
            "a domains",
            "script urls",
            "meta",
            "pragma",
            "general full",
            "reverse dns",
            "software",
            "resource",
            "security tls",
            "piscataway",
            "asn20473",
            "asn15169",
            "google",
            "asvultr",
            "portfolio",
            "josh theriault",
            "upei",
            "university",
            "island",
            "roblox",
            "jmt studios",
            "moon engine",
            "android",
            "icpc",
            "north america",
            "qualifier",
            "hello",
            "apache",
            "runner",
            "eric everest",
            "games",
            "cloudflar",
            "amazon02",
            "as autonomous",
            "system",
            "canada",
            "value",
            "domainpath name",
            "cgjerrieegaggq",
            "name value",
            "form",
            "game development",
            "blog",
            "jmt99",
            "developer",
            "event",
            "bullseye",
            "trick or treat",
            "unofficial trick or treat 2014",
            "unofficial trick or treat 2015",
            "egg hunt",
            "gift hunt",
            "hallows quest",
            "studio",
            "experience",
            "fall",
            "january",
            "july",
            "founder",
            "studio head",
            "passive dns",
            "urls",
            "registrar",
            "title",
            "roblox jmt99 \"jmt studios\" \"trick or treat\" \"egg hunt\"",
            "press copyright",
            "contact",
            "privacy policy",
            "safety how",
            "youtube",
            "test",
            "nfl sunday",
            "ticket",
            "google llc",
            "data upload",
            "extraction",
            "failed",
            "files",
            "twitter",
            "variables",
            "cgjjtbieggagla",
            "nid value",
            "expiration date",
            "files ip",
            "dynamicloader",
            "write c",
            "delete c",
            "intel",
            "ms windows",
            "medium",
            "default",
            "write",
            "guard",
            "mozilla",
            "malware",
            "defender",
            "unknown",
            "domains",
            "hashes",
            "url analysis",
            "unknown aaaa",
            "script domains",
            "certificate",
            "game",
            "servers",
            "unofficial",
            "settings",
            "public",
            "endpoints",
            "currently",
            "game servers",
            "current",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "role title",
            "related pulses",
            "domain v",
            "url indicator",
            "nameilname",
            "ascii text",
            "mitre att",
            "ck id",
            "ck matrix",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "pe file",
            "high",
            "yara detections",
            "dynamic",
            "v hostname",
            "se fos",
            "include v",
            "domain url",
            "data",
            "alltypes",
            "win32mydoom oct",
            "trojan",
            "url add",
            "http",
            "related nids",
            "files location",
            "canada flag",
            "canada hostname",
            "canada unknown",
            "canada",
            "present aug",
            "name servers",
            "present sep",
            "aaaa",
            "present oct",
            "crlf line",
            "unicode text",
            "music",
            "suspicious",
            "bricked.wtf",
            "flag united",
            "google safe",
            "domain",
            "address domain",
            "united states",
            "filehashsha256",
            "hostname xn",
            "finland unknown",
            "filehashmd5",
            "indicators hong",
            "kong",
            "south korea",
            "present jun",
            "present mar",
            "present may",
            "olet",
            "cnr12",
            "tlsv1",
            "get updates",
            "upatre",
            "added active",
            "apple",
            "everest",
            "josh paul",
            "upadter",
            "convagent",
            "info stealing",
            "delete service",
            "phishing",
            "fraud",
            "social engineering",
            "gamer",
            "hacker",
            "adversaries",
            "icloud",
            "found",
            "gmt content",
            "error",
            "redacted for",
            "meta http",
            "content",
            "gmt server",
            "france unknown",
            "poland unknown",
            "content type",
            "xml title",
            "hostname add",
            "address",
            "location united",
            "life",
            "century link llc",
            "xfinity",
            "livesex",
            "domain add",
            "users",
            "show",
            "delete",
            "blocked by quad9",
            "showing",
            "record value",
            "location canada",
            "canada asn",
            "accept",
            "cookie",
            "macbook",
            "ipv4 add",
            "america flag",
            "america asn",
            "asn as714",
            "less",
            "woodynet",
            "next associated",
            "status",
            "exclude sugges",
            "ip related",
            "t1027.013"
          ],
          "references": [
            "https://www.jmtstudios.org/farewell/",
            "https://www.youtube.com/channel/UCSYMkiAJcNXbO5-aemTSxvw",
            "graphql.accounts.instagram.disk- cloud.link encrynt lenter source leric everest l Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link showing system",
            "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
            "ConventionEngine_Term_Dropbox \u2022 Dropbox",
            "http://api.jmtstudios.org/",
            "bricked.wtf",
            "ic1-privaterelay.appleid.com \u2022 ic2-privaterelay.appleid.com\t\u2022 ic4-privaterelay.appleid.com",
            "http://apple-carry-relay.fastly-edge.com \u2022 appleid.com \u2022 charterhomeschoolacademy.appleid.com",
            "careersandenterprise.appleid.com \u2022 http://apple.appleid.com/",
            "https://forwardemail.net/es/blog/open-source/apple-email-clients",
            "accounts.instagram.disk-cloud.link \u2022\tgraphql.accounts.instagram.disk-cloud",
            "http://mc.yandex-team.settings.storage-cloud.link/ \u2022 ru.disk-cloud.link",
            "http://www.visitbooker.com/Dropbox-07/index.htm",
            "dash.ocrobot.com \u2022 robottherobot.com \u2022http://www.robottherobot.com/",
            "Appears to be closely associated with  close relative and initial victim of attack.",
            "Potentially disturbing , personal , invasive, aggressive, intimate behavior of party."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Hong Kong",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Convagent-9981433-0",
              "display_name": "Win.Malware.Convagent-9981433-0",
              "target": null
            },
            {
              "id": "Upadter",
              "display_name": "Upadter",
              "target": null
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6996,
            "FileHash-MD5": 281,
            "FileHash-SHA1": 220,
            "FileHash-SHA256": 2673,
            "domain": 1747,
            "email": 24,
            "hostname": 2803,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 14747,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6608aaf7ca0e965e593ed1d4",
          "name": "MUI programu Microsoft Office Access (w j\u0119zyku angielskim) zosta\u0142o u\u017cyte do wys\u0142ania z\u0142o\u015bliwego oprogramowania na serwer w Czechach jest to pierwszy tego typu atak na komputer.                     e",
          "description": "A look back at some of the key words and phrases used to describe the situation in Italy, as \"probacja\" (or \"democrata), as they were translated into English.",
          "modified": "2025-10-17T11:03:07.034000",
          "created": "2024-03-31T00:14:47.183000",
          "tags": [
            "sha256",
            "ssdeep",
            "reputacja",
            "tworzy pliki",
            "informacje",
            "bardzo duga",
            "tworzy",
            "adresy url",
            "tworzy katalog",
            "win64",
            "ameryki",
            "typ pliku",
            "serwer nazw",
            "san jose",
            "adres",
            "digital",
            "data wyganicia",
            "csc corporate",
            "domains",
            "ca data",
            "data utworzenia",
            "dnssec"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6432,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2140,
            "hostname": 5874,
            "FileHash-SHA256": 12539,
            "FileHash-MD5": 3686,
            "FileHash-SHA1": 2751,
            "IPv4": 503,
            "URL": 10770,
            "email": 26,
            "CVE": 88,
            "YARA": 6,
            "JA3": 2,
            "IPv6": 28,
            "SSLCertFingerprint": 5,
            "BitcoinAddress": 3,
            "CIDR": 1
          },
          "indicator_count": 38422,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "184 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "689af6a1704fa2745bc8c2a3",
          "name": "Hijacked Twitter / X.com account. Phishing | Abnormal use",
          "description": "Hijacked phishing Twitter/ X.com.\nWin32/Unruy.C Activity\n#phishing #hijacked #intercoms #unruy #trojan #VTflood #malware #attack",
          "modified": "2025-09-11T08:02:36.759000",
          "created": "2025-08-12T08:09:05.642000",
          "tags": [
            "log id",
            "gmtn",
            "secure",
            "tls web",
            "passive dns",
            "urls",
            "path",
            "self",
            "encrypt",
            "ca issuers",
            "false",
            "search",
            "read c",
            "united",
            "entries",
            "show",
            "showing",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "copy",
            "write",
            "suspicious",
            "malware",
            "unknown",
            "process32nextw",
            "shellexecuteexw",
            "medium process",
            "discovery t1057",
            "t1057",
            "discovery",
            "medium",
            "locally unique",
            "identifier",
            "veailmboprd",
            "next associated",
            "ipv4 add",
            "pulse pulses",
            "files",
            "asn as13335",
            "dns resolutions",
            "domains top",
            "smoke loader",
            "trojan",
            "body",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "show process",
            "programfiles",
            "command decode",
            "flag",
            "suricata ipv4",
            "mitre att",
            "show technique",
            "ck matrix",
            "date",
            "comspec",
            "model",
            "twitter",
            "august",
            "hybrid",
            "general",
            "click",
            "strings"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1504,
            "FileHash-SHA256": 1232,
            "SSLCertFingerprint": 14,
            "domain": 245,
            "hostname": 526,
            "FileHash-MD5": 43,
            "FileHash-SHA1": 38
          },
          "indicator_count": 3602,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "220 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68632c19dd335ce48dbc3798",
          "name": "Apple Zombie- Multi Malware/ Ransom attack affects Upscale Networks | Devices",
          "description": "Apple IoC\u2019s Isolated from Lifestyle Community\n\u2022 Win.Packer.pkr_ce1a-9980177-0\n\u2022 Antivirus Detections\nWin.Dropper.Zombie-10044469-0\n, \nTrojan:Win32/Zombie.A |\nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 polymorphic\n\u2022 procmem_yara\n\u2022 static_pe_anomaly\n\u2022 anomalous_deletefile\n#remote #device #dns #dead_host #pointers\n#active #targeting #ops #more\u2026",
          "modified": "2025-07-31T00:00:48.083000",
          "created": "2025-07-01T00:30:17.324000",
          "tags": [
            "dynamicloader",
            "vx10",
            "nxd2xebwx87",
            "wx10",
            "mxd78x8b",
            "port",
            "x0cqpyx0c",
            "delete c",
            "yara rule",
            "high",
            "tofsee",
            "grum",
            "copy",
            "stream",
            "powershell",
            "write",
            "malware",
            "push",
            "united",
            "name servers",
            "search",
            "creation date",
            "servers",
            "moved",
            "passive dns",
            "urls",
            "domain",
            "record value",
            "date",
            "body",
            "users",
            "intel",
            "ms windows",
            "pe32",
            "number",
            "pe32 executable",
            "ascii text",
            "crlf line",
            "database",
            "installer",
            "template",
            "trojan"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 202,
            "hostname": 217,
            "FileHash-SHA256": 852,
            "FileHash-MD5": 238,
            "FileHash-SHA1": 164,
            "SSLCertFingerprint": 3,
            "URL": 947,
            "email": 3
          },
          "indicator_count": 2626,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "262 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68451577ada8bb0aa0834edb",
          "name": "X - Business Social Media Account used to attack victim",
          "description": "Victims business social media accounts deleted. Used to commit malicious activity against businesses, espionage , financial abuse.",
          "modified": "2025-07-08T04:03:04.386000",
          "created": "2025-06-08T04:45:43.423000",
          "tags": [
            "trojan",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "upxoepplace",
            "pulses none",
            "related tags",
            "none file",
            "markus",
            "april",
            "win32",
            "copy",
            "usvwu",
            "usvw",
            "high",
            "medium",
            "show",
            "uss c",
            "binary file",
            "yara",
            "write",
            "delphi",
            "enigma",
            "present mar",
            "aaaa",
            "united",
            "passive dns",
            "date",
            "present nov",
            "moved",
            "urls",
            "creation date",
            "entries",
            "body",
            "trojandropper",
            "susp",
            "msr jul",
            "next associated",
            "pulse pulses",
            "mtb jun",
            "backdoor",
            "content length",
            "html document",
            "ascii text",
            "search",
            "internalname",
            "entries pe",
            "showing",
            "filehash",
            "md5 add",
            "av detections",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "pattern match",
            "size",
            "encrypt",
            "june",
            "hybrid",
            "local",
            "path",
            "click",
            "twitter",
            "strings",
            "url https",
            "url http",
            "report spam",
            "created",
            "hours ago",
            "bad actor",
            "ck ids",
            "t1057",
            "discovery",
            "t1071",
            "amer",
            "ipv4",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "china",
            "hong kong",
            "russia",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "pulses url",
            "filehashsha256",
            "url add",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "domain",
            "hostname",
            "next",
            "filehashmd5",
            "protocol",
            "t1105",
            "tool transfer",
            "t1480"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 637,
            "FileHash-SHA1": 639,
            "FileHash-SHA256": 5380,
            "domain": 676,
            "hostname": 1120,
            "URL": 1031,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 9487,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6843fe89793d0ef8e2afc34d",
          "name": "Deleted SocialMedia",
          "description": "Bad Actor Deleted SocialMedia account found in breach forum.",
          "modified": "2025-07-07T08:03:42.325000",
          "created": "2025-06-07T08:55:37.612000",
          "tags": [
            "body",
            "secure",
            "self",
            "path",
            "date sat",
            "gmt contenttype",
            "connection",
            "accept",
            "gmt pragma",
            "deny",
            "maxage34214400",
            "learn",
            "spawns",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "ssl certificate",
            "found",
            "copy sha256",
            "copy md5",
            "copy sha1",
            "sha1",
            "sha256",
            "size",
            "type data",
            "ascii text",
            "pattern match",
            "mitre att",
            "show technique",
            "ck matrix",
            "file",
            "indicator",
            "show process",
            "encrypt",
            "june",
            "hybrid",
            "local"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1628,
            "domain": 58,
            "URL": 390,
            "hostname": 204,
            "FileHash-MD5": 84,
            "FileHash-SHA1": 88,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 2456,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "286 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6824017a408750234d1725b4",
          "name": "&raquo; RFC Editor",
          "description": "The Internet Research Council ( RFCs) is a collection of technical and policy documents produced by five streams of the Internet's governing body, the Federal Communications Commission (FCC), which is based in Washington DC.",
          "modified": "2025-06-13T02:05:55.518000",
          "created": "2025-05-14T02:35:38.576000",
          "tags": [
            "rfc series",
            "ietf",
            "rfc editor",
            "search",
            "rfcs",
            "task force",
            "irtf",
            "html",
            "negotiation",
            "advanced search",
            "model",
            "contact",
            "dns resolution",
            "virus mydoom",
            "engineering steering",
            "iesg",
            "expired",
            "authority",
            "trust verisign",
            "class",
            "secure server",
            "data source",
            "generic trojan",
            "mitm",
            "csrf",
            "proxy type",
            "phishingsite",
            "tls mitm",
            "phishing",
            "ddos",
            "maninthemiddle",
            "iframe",
            "miner",
            "oceanlotus",
            "morto"
          ],
          "references": [
            "http://rfc-editor.org",
            "https://www.rfc-editor.org/rfc/pdfrfc/rfc7421.txt.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Engineering Steering",
              "display_name": "Engineering Steering",
              "target": null
            },
            {
              "id": "IESG",
              "display_name": "IESG",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 86,
            "domain": 8,
            "email": 6,
            "URL": 165,
            "hostname": 37,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 314,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "310 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "681386d75c34469176686756",
          "name": "x.com/KulinskiArkadi",
          "description": "",
          "modified": "2025-05-31T14:01:10.044000",
          "created": "2025-05-01T14:36:07.422000",
          "tags": [
            "script",
            "etag",
            "sharing",
            "cors",
            "mediatype",
            "mediasubtype",
            "contenttype",
            "header",
            "combination",
            "compression",
            "encrypt",
            "cookie",
            "critical",
            "twitter",
            "iframe",
            "insert",
            "info",
            "error",
            "suspicious",
            "find",
            "screen",
            "grok",
            "body"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 471,
            "CIDR": 34,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 5,
            "FileHash-SHA256": 1177,
            "domain": 214,
            "hostname": 430,
            "email": 2
          },
          "indicator_count": 2342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "323 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66b910d6b8a1a2fade2e72f1",
          "name": "Twitter.com = X.com Migration to malware templates Brian Sabey photos| | Framing target| HoneyPots?",
          "description": "Again, multiple malicious X.com Twitter migration templates with photos of Brian Sabey and wife appear separately Sabey appear in Tsara Brashears search results with 'LDS Mafia' and Dia Sabey's 'Anti Trump' sentiment.  Believed to be 'remotely' self hosted on a server purported  to belong to Brashears. This has been done for a while to implicate target hosting and spreading well over 1 million illegal adult, murder,threat and darker sites,murls,domains. It's untrue and is considered framing since 2017, who reported it. \nRedirects to:\n\nhttps://twitter.com?mx=1\nTsara Brashears fake server is Brian Sabey, Red Team, potentially Law Enforcement, idk. \nIP address: 104.244.42.129\n\nHosting: Unknown\n\nRunning on: Tsa B (Tsara Brashears)\nCMS: Express\nPowered by: Express\n\n#VirTool:Win32/Obfuscator.ADB\nALF:E5.SpikeAex.DYNHASH\nTrojan:Win32/Upatre\nTrojan:Win32/Vflooder",
          "modified": "2024-10-11T00:04:00.735000",
          "created": "2024-08-11T19:28:22.948000",
          "tags": [
            "ip address",
            "b cms",
            "express",
            "security risk",
            "found https",
            "server tsa",
            "b server",
            "digicert inc",
            "web application",
            "expiresthu",
            "path",
            "secure",
            "self",
            "body",
            "sha256 hash",
            "http response",
            "gmt perf",
            "accept expiry",
            "gmt pragma",
            "referrer",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "united",
            "flag",
            "contacted",
            "http traffic",
            "as20940",
            "name servers",
            "status",
            "search",
            "invalid url",
            "passive dns",
            "urls",
            "next",
            "as13414 twitter",
            "as15133 verizon",
            "nxdomain",
            "whitelisted",
            "a nxdomain",
            "aaaa",
            "trojan",
            "virtool",
            "twitter",
            "date hash",
            "avast avg",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "copyright",
            "levelblue",
            "showing",
            "scan endpoints",
            "all scoreblue",
            "server tsa b",
            "trojan features",
            "brian sabey",
            "cname",
            "as35994 akamai",
            "as4230 claro",
            "brazil",
            "date",
            "unknown",
            "ireland unknown",
            "registrar",
            "ionos se",
            "brain sabey"
          ],
          "references": [
            "Researched Link: https://twitter.com/x/migrate?tok=7b2265223a222f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a7836506d37714f3248417858516d496b454864736445653851716f55426567514941784142267573673d414f76566177333047616a6b6e31444f6c50716444715861477457632532302532302f75726c3f657372633d7326713d267263743d6a2673613d552675726c3d68747470733a2f2f747769747465722e636f6d2f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a783",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /.git/HEAD",
            "https://twitter.com/404javascript.js",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
            "https://unify.apideck.com/vault/callback",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc%20%20/url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
            "Framing target as a self host of malicious, malware filled templates via twitter.com migrate to X.com",
            "Redirects to:  https://twitter.com?mx=1  IP address: 104.244.42.129  Hosting: Unknown Running on: Tsa B  CMS: Express  Powered by: Express",
            "Block ID:\tEVA120 ?"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Ireland"
          ],
          "malware_families": [
            {
              "id": "ALF:E5.SpikeAex.DYNHASH",
              "display_name": "ALF:E5.SpikeAex.DYNHASH",
              "target": null
            },
            {
              "id": "Trojan:Win32/Upatre",
              "display_name": "Trojan:Win32/Upatre",
              "target": "/malware/Trojan:Win32/Upatre"
            },
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1110.004",
              "name": "Credential Stuffing",
              "display_name": "T1110.004 - Credential Stuffing"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 451,
            "domain": 353,
            "FileHash-SHA256": 1714,
            "hostname": 418,
            "FileHash-MD5": 419,
            "FileHash-SHA1": 419,
            "email": 7
          },
          "indicator_count": 3781,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "555 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c5e0783f84565b1fe842e1",
          "name": "Twitter\u00bbX.com migration to malware templates Attorney Brian Sabey  Hall Render ",
          "description": "",
          "modified": "2024-10-11T00:04:00.735000",
          "created": "2024-08-21T12:41:28.437000",
          "tags": [
            "ip address",
            "b cms",
            "express",
            "security risk",
            "found https",
            "server tsa",
            "b server",
            "digicert inc",
            "web application",
            "expiresthu",
            "path",
            "secure",
            "self",
            "body",
            "sha256 hash",
            "http response",
            "gmt perf",
            "accept expiry",
            "gmt pragma",
            "referrer",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "united",
            "flag",
            "contacted",
            "http traffic",
            "as20940",
            "name servers",
            "status",
            "search",
            "invalid url",
            "passive dns",
            "urls",
            "next",
            "as13414 twitter",
            "as15133 verizon",
            "nxdomain",
            "whitelisted",
            "a nxdomain",
            "aaaa",
            "trojan",
            "virtool",
            "twitter",
            "date hash",
            "avast avg",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "copyright",
            "levelblue",
            "showing",
            "scan endpoints",
            "all scoreblue",
            "server tsa b",
            "trojan features",
            "brian sabey",
            "cname",
            "as35994 akamai",
            "as4230 claro",
            "brazil",
            "date",
            "unknown",
            "ireland unknown",
            "registrar",
            "ionos se",
            "brain sabey"
          ],
          "references": [
            "Researched Link: https://twitter.com/x/migrate?tok=7b2265223a222f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a7836506d37714f3248417858516d496b454864736445653851716f55426567514941784142267573673d414f76566177333047616a6b6e31444f6c50716444715861477457632532302532302f75726c3f657372633d7326713d267263743d6a2673613d552675726c3d68747470733a2f2f747769747465722e636f6d2f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a783",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /.git/HEAD",
            "https://twitter.com/404javascript.js",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
            "https://unify.apideck.com/vault/callback",
            "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc%20%20/url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
            "Framing target as a self host of malicious, malware filled templates via twitter.com migrate to X.com",
            "Redirects to:  https://twitter.com?mx=1  IP address: 104.244.42.129  Hosting: Unknown Running on: Tsa B  CMS: Express  Powered by: Express",
            "Block ID:\tEVA120 ?"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Ireland"
          ],
          "malware_families": [
            {
              "id": "ALF:E5.SpikeAex.DYNHASH",
              "display_name": "ALF:E5.SpikeAex.DYNHASH",
              "target": null
            },
            {
              "id": "Trojan:Win32/Upatre",
              "display_name": "Trojan:Win32/Upatre",
              "target": "/malware/Trojan:Win32/Upatre"
            },
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1110.004",
              "name": "Credential Stuffing",
              "display_name": "T1110.004 - Credential Stuffing"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66b910d6b8a1a2fade2e72f1",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 615,
            "domain": 368,
            "FileHash-SHA256": 1751,
            "hostname": 443,
            "FileHash-MD5": 419,
            "FileHash-SHA1": 419,
            "email": 7
          },
          "indicator_count": 4022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "555 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6695e27f356a22d97fba5ca8",
          "name": "Critical attack/s continues to affect YouTube Creator/s account/s",
          "description": "Related to YouTube creator/s  attack/s. Found as part of Jays Youtube Bot.exe and YouTube bots.\nFull CnC, access and id devices. Redirects views, resells. spoofs, binds and/or accounts. FRAUD! \nReference: YARA Signature Match - THOR APT Scanner\nRULE: SUSP_Wextract_Anomaly_Unsigned_May23\nRULE_SET: Livehunt - Suspicious290 Indicators \ud83c\udff9\nRULE_TYPE: THOR APT Scanner's rule set only \ud83d\udd28\nRULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_Wextract_Anomaly_Unsigned_May23\nDESCRIPTION: Detects an anomalous unsigned wextract that contains additional code and has been seen abused to deliver malware\nREFERENCE: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution/\nRULE_AUTHOR: X__Junior\nThor for details #susp_wextract_anomaly_unsigned_may23",
          "modified": "2024-08-15T02:00:24.886000",
          "created": "2024-07-16T03:01:17.316000",
          "tags": [
            "win32 exe",
            "wextract",
            "kb file",
            "files",
            "file type",
            "javascript",
            "graph",
            "ip detections",
            "country",
            "userprofile",
            "runtime modules",
            "samplepath",
            "delnoderundll32",
            "mpgph131 hr",
            "hourly rl",
            "highest c",
            "mpgph131 lg",
            "onlogon rl",
            "highest",
            "process",
            "registrya",
            "registry keys",
            "registry",
            "windows policy",
            "shell folders",
            "file execution",
            "binary data",
            "security center",
            "text c",
            "peexe c",
            "xml c",
            "zip c",
            "file system",
            "written c",
            "dropped",
            "hashes",
            "windows nt",
            "wow64",
            "referer https",
            "date thu",
            "get https",
            "request",
            "gecko response",
            "gmt connection",
            "gmt vary",
            "etag",
            "accept",
            "win64",
            "query",
            "windows get",
            "internal",
            "set file",
            "create",
            "create process",
            "windows read",
            "shutdown system",
            "modify access",
            "delete registry",
            "enumerate",
            "behavior tags",
            "k0pmbc",
            "spsfsb",
            "ctsu",
            "efq78c",
            "egw7od",
            "en3i8d",
            "i6ydgd",
            "iz1fbc",
            "izt63",
            "kum7z",
            "vs2003",
            "sp1 build",
            "contained",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "simplified",
            "army",
            "variant sides",
            "with russia",
            "ramnit",
            "netsupport rat",
            "sneaky server",
            "replacement",
            "unauthorized",
            "sim unlock",
            "emotet",
            "chaos",
            "malicious",
            "critical",
            "copy",
            "life",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "cc linker",
            "urls",
            "gandi sas",
            "domains",
            "cloudflare",
            "ii llc",
            "psiusa",
            "domain robot",
            "ltd dba",
            "com laude",
            "ascio",
            "contacted",
            "ms word",
            "document",
            "b file",
            "html",
            "javascript jac",
            "html iu3",
            "executed by usa",
            "#wextract",
            "#unsigned",
            "thor",
            "stealer",
            "evader",
            "systemroot",
            "grum",
            "high",
            "delete c",
            "cape",
            "write",
            "103 read",
            "clsid read",
            "date read",
            "trojan",
            "united",
            "unknown",
            "status",
            "cname",
            "creation date",
            "search",
            "as1921",
            "austria unknown",
            "emails",
            "expiration date",
            "date",
            "pragma",
            "next",
            "passive dns",
            "backdoor",
            "win32",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "usa",
            "co",
            "teams",
            "cybercrime",
            "spoof",
            "benjamin",
            "dynamicloader",
            "write c",
            "pe32 executable",
            "show",
            "yara rule",
            "windows",
            "recon",
            "worm",
            "powershell",
            "june",
            "delphi",
            "malware",
            "malice",
            "retaliation",
            "through the nights",
            "apple",
            "lenovo",
            "ios",
            "hackers",
            "move",
            "moved"
          ],
          "references": [
            "WEXTRACT.EXE .MUI: FileHash-SHA256 00e5aefb5ffd357e995d1a4ee30735a692780b203cd58e6239637471047d51a4",
            "MALWARE STEALER TROJAN EVADER | WEXTRACT.EXE .MUI | TXTRESSE | via https://www.virustotal.com/gui/domain/www.youtube.com",
            "CS Sigma: Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Critical CS Sigma: Matches rule Suspicious Double Extension File Execution by Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)",
            "^ by Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems) ^",
            "CS Sigma: Matches rule Disable Windows Defender Functionalities Via Registry Keys by AlertIQ, J\u00e1n Tren\u010dansk\u00fd, frack113, Nasreddine Bencherchali, Swachchhanda Shrawan",
            "CS Sigma: Matches rule Chromium Browser Instance Executed With Custom Extension by Aedan Russell, frack113, X__Junior (Nextron Systems)",
            "CS Sigma: Matches rule Suspicious Add Scheduled Task Parent by Florian Roth (Nextron Systems)",
            "CS Sigma: Matches rule Suspicious Schtasks Schedule Type With High Privileges by Nasreddine Bencherchali (Nextron Systems)",
            "CS Sigma: Matches rule Scheduled Task Creation by Florian Roth (Nextron Systems)",
            "CS IDS: Matches rule (stream_tcp) data sent on stream not accepting data",
            "CS IDS: Matches rule (http_inspect) HTTP response has UTF character set that failed to normalize",
            "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Exfiltration)",
            "CS IDS: Matches rule ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)",
            "CS IDS: Matches rule ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)",
            "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Token)  Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (External IP)",
            "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Activity)",
            "CS IDS: Matches rule ET USER_AGENTS Microsoft Device Metadata Retrieval Client User-Agent",
            "CS IDS: Matches rule ET MALWARE Suspected RisePro TCP Heartbeat Packet",
            "CS IDS: Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "CS IDS: Matches rule ET MALWARE Win32/Ramnit Checkin Matches rule MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
            "TXTRESSE: FileHash-SHA256 00001dd58b69582cc30a16b000bce3d96d369487444385489084719676afba4d",
            "Crowdsourced YARA rules: Matches rule UPX from ruleset UPX by kevoreilly",
            "Crowdsourced YARA rules: Matches rule win_ramnit_auto from ruleset win.ramnit_auto by Felix Bilstein - yara-signator at cocacoding dot com",
            "Crowdsourced YARA rules: Matches rule MAL_Ramnit_May19_1 from ruleset crime_nansh0u by Florian Roth (Nextron Systems)",
            "Crowdsourced IDS rules: Matches rule: MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
            "Crowdsourced IDS rules: Matches rule: (port_scan) UDP filtered",
            "Crowdsourced IDS rules: Matches rule: ET MALWARE Win32/Ramnit Checkin | Matches rule ET DNS Query for .cc TLD",
            "https://www.nextron-systems.com/notes-on-virustotal-matches/",
            "TrojanDownloader:Win32/Upatre ,  Virus:Win32/Sality.AT , Win.Downloader.Small-1645",
            "Antivirus Detections: Backdoor:Win32/Likseput.B ,  PWS:Win32/QQpass.B!MTB ,  Trojan:Win32/Scrarev.C ,  Trojan:Win32/Speesipro.A ,  Trojan:Win32/Zombie.A ,  TrojanDownloader:Win32/Cutwail.BS ,  TrojanDownloader:Win32/Nemucod ,",
            "IDS Detections: Backdoor.Win32.Pushdo.s Checkin Backdoor.Win32.Pushdo.s Checkin Suspicious csrss.exe in URI",
            "https://www.virustotal.com/gui/file/00e5aefb5ffd357e995d1a4ee30735a692780b203cd58e6239637471047d51a4/detection",
            "Jays Youtube Bot.exe > FileHash-SHA256 00514527e00ee001d042",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2",
            "https://www.youtube.com/watch?v=GyuMozsVyYs",
            "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
            "https://otx.alienvault.com/pulse/6694bb9be1b61bf820500004",
            "http://193.233.132.62/hera/amadka.exe | https://www.info-only-men.com/landing/mlp88g?subPublisher=popunder:eu-adsrv.rtbsuperhub.com&zone=popunder:eu-adsrv.rtbsuperhub.com&",
            "https://software-free-phone-2018.win/62ae8f9b-d0cb-4b4c-8318-dd7900e1d092/e29481e9-a792-46a8-bbf0-188ed2a816ae/?brand=Apple&browser=Safari&btd=dHJr",
            "nr-data.net [Apple Private Data Collection]",
            "https://rector-fitiology.icu/99c8d3a6-be16-421a-87a8-40701eae8149?zoneid=6543079&bannerid=18710758&browser=chrome&os=ios&devic",
            "https://software-free-phone-2018.win/7a7c1101-0538-49de-925f-4f4675a5fd1f/3b0669f6-a07e-4eb8-8e2b-d0282d482c1a/?brand=Lenovo&browser=Chr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WAT:Blacked-E",
              "display_name": "WAT:Blacked-E",
              "target": null
            },
            {
              "id": "Win32:RmnDrp [Inf]",
              "display_name": "Win32:RmnDrp [Inf]",
              "target": null
            },
            {
              "id": "AI:FileInfector.EAEEA7850C",
              "display_name": "AI:FileInfector.EAEEA7850C",
              "target": null
            },
            {
              "id": "Virus.Ramnit/Nimnul",
              "display_name": "Virus.Ramnit/Nimnul",
              "target": null
            },
            {
              "id": "Trojan.Crifi.1",
              "display_name": "Trojan.Crifi.1",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injurer.cbd",
              "display_name": "Trojan.MSIL.Injurer.cbd",
              "target": null
            },
            {
              "id": "Win.Downloader.Small-1645",
              "display_name": "Win.Downloader.Small-1645",
              "target": null
            },
            {
              "id": "Trojan:Win32/Scrarev.C",
              "display_name": "Trojan:Win32/Scrarev.C",
              "target": "/malware/Trojan:Win32/Scrarev.C"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Trojan:Win32/Speesipro.A",
              "display_name": "Trojan:Win32/Speesipro.A",
              "target": "/malware/Trojan:Win32/Speesipro.A"
            },
            {
              "id": "Virus:Win32/Sality.AT",
              "display_name": "Virus:Win32/Sality.AT",
              "target": "/malware/Virus:Win32/Sality.AT"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "TrojanDownloader:Win32/Nemucod",
              "display_name": "TrojanDownloader:Win32/Nemucod",
              "target": "/malware/TrojanDownloader:Win32/Nemucod"
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Backdoor:Win32/Likseput.B",
              "display_name": "Backdoor:Win32/Likseput.B",
              "target": "/malware/Backdoor:Win32/Likseput.B"
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "ALF:HeraklezEval:TrojanSpy:Win32/SocStealer",
              "display_name": "ALF:HeraklezEval:TrojanSpy:Win32/SocStealer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1134.004",
              "name": "Parent PID Spoofing",
              "display_name": "T1134.004 - Parent PID Spoofing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1003.007",
              "name": "Proc Filesystem",
              "display_name": "T1003.007 - Proc Filesystem"
            },
            {
              "id": "T1042",
              "name": "Change Default File Association",
              "display_name": "T1042 - Change Default File Association"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Media",
            "Technology",
            "Civil Society",
            "Crime Victims"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4312,
            "domain": 1056,
            "hostname": 1818,
            "URL": 5125,
            "FileHash-MD5": 310,
            "FileHash-SHA1": 221,
            "email": 3
          },
          "indicator_count": 12845,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "612 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "669f882c5109175fe742fe58",
          "name": "(I Cloned Title & Pulse) WHO EVERYONE HAS BEEN LOOKING FOR  [Pulse of  IoC's Curated  by user Streaming Ex]",
          "description": "",
          "modified": "2024-07-23T10:38:36.002000",
          "created": "2024-07-23T10:38:36.002000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65709e14974bdb5d6dbda091",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2066,
            "URL": 1939,
            "hostname": 2768,
            "FileHash-SHA256": 276,
            "email": 90,
            "CVE": 47,
            "CIDR": 1,
            "FileHash-MD5": 16,
            "FileHash-SHA1": 4
          },
          "indicator_count": 7207,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "635 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536881127f5ee988306394",
          "name": "iOS Attack - Crouching Yeti: http://x.com/denverpolice/status/|",
          "description": "Targeted triangulation. Apple iOS iPad. Attack chains of Operation Triangulation involves advanced tactics employed by those acting as secret middleman, deploying spoofed trusted websites, emails, alarming news stories, messages, Bluetooth hacking, if threat actor has full CnC of targets phone via injection (sometimes it's random) can power on B/T.   In Spoofed sites, malicious redirects, iMessage 0day case. Zero-click iMessage exploit seen. Information is sent to attacker and stored. Data harvesting, financial & identity theft, service modification and DoS intended. Used by law enforcement, governments, attorney PI's, cyber security defense, red teams and/or malicious hackers.\n*Crouching Yeti threat description notes: Contextual Indicators: Domain is classified as Social Networking Contextual Indicators: The URL is known benign by Check Point's Threat Cloud Contextual Indicators: Https://x.com is popular among websites with good reputation Contextual Indicators: Domain Cisco Umbrella rank is 312.",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T16:51:13.962000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "663 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536c8eee8d42d670e27723",
          "name": "Eternal Blue _ WannaCry MS17-010  | Apple iOS iMessage injection infiltration",
          "description": "",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T17:08:30.022000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66536881127f5ee988306394",
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "663 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66480cb1cc174fd804e0cef9",
          "name": "Elgoogle",
          "description": "",
          "modified": "2024-05-18T02:12:28.801000",
          "created": "2024-05-18T02:04:33.967000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65709f0bbdd32cb4b343a12f",
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Elgoogle",
            "id": "281171",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2514,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 8,
          "modified_text": "701 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b4296442cc8db50a264f",
          "name": "Maui Ransomware ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:28:41.569000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653977171f690fb9ab978bf3",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b87d2d435bdad9ce80a3",
          "name": "Racoon Stealer ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:47:09.818000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aab8eb55243c504a2cb4c0",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-19T18:01:15.365000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afcb842689eb776c0737e5",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-23T14:21:56.725000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aab8eb55243c504a2cb4c0",
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6558c481715409563073cb79",
          "name": "Fraud Services",
          "description": "http://kramtechnology.com/, fraud services, network, rat, trojan, phishing, malvertizing, malware hosting, scanning host, archives browser events.",
          "modified": "2023-12-18T05:05:36.760000",
          "created": "2023-11-18T14:04:48.923000",
          "tags": [
            "methodpost",
            "dropped",
            "contacted",
            "ssl certificate",
            "whois record",
            "zva8k4ghshhpcb5",
            "contacted urls",
            "q0gpyr1balpdgpo",
            "historical ssl",
            "page dow",
            "blacklist http",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "million",
            "paypal",
            "team phishing",
            "malicious url",
            "alexa",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "malware",
            "united",
            "passive dns",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "twitter",
            "log id",
            "gmtn",
            "sectigo rsa",
            "secure server",
            "tls web",
            "salford",
            "sectigo limited",
            "ocsp",
            "false",
            "california",
            "british virgin",
            "locality",
            "d3 a5",
            "url http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 14816,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 5158,
            "domain": 3758,
            "hostname": 2961,
            "email": 4,
            "SSLCertFingerprint": 3,
            "CVE": 3
          },
          "indicator_count": 26777,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bc6301b7cdf7d04e095",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:44:54.422000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bdc3676a40633a619be",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:45:16.667000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568d67bd96e06ab44b9b95",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-16T21:45:11.721000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65536bdc3676a40633a619be",
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a756ee3c8ce2314e235a",
          "name": "Home Networks",
          "description": "",
          "modified": "2023-12-06T16:54:46.263000",
          "created": "2023-12-06T16:54:46.263000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 290,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2298,
            "FileHash-SHA256": 24535,
            "FileHash-MD5": 7197,
            "URL": 1188,
            "hostname": 2636,
            "JA3": 2,
            "email": 96,
            "CVE": 44,
            "FileHash-SHA1": 7174
          },
          "indicator_count": 45170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709f0bbdd32cb4b343a12f",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:19:23.067000",
          "created": "2023-12-06T16:19:23.067000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2514,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709eee2f74978bd15d60a9",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:53.346000",
          "created": "2023-12-06T16:18:53.346000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2219,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ed8415c89746a234d89",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:32.627000",
          "created": "2023-12-06T16:18:32.627000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44903,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ebd65cdc059b8e373ef",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:05.044000",
          "created": "2023-12-06T16:18:05.044000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2519,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 36
          },
          "indicator_count": 44910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ea58a4b251d0f7aac7b",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:17:41.816000",
          "created": "2023-12-06T16:17:41.816000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2221,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1176,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 37
          },
          "indicator_count": 44909,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e8b31eda9b13196277a",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:17:15.458000",
          "created": "2023-12-06T16:17:15.458000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2222,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1176,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 38
          },
          "indicator_count": 44911,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e736e1768898768814f",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:16:51.265000",
          "created": "2023-12-06T16:16:51.265000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2221,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1179,
            "hostname": 2521,
            "JA3": 2,
            "email": 84,
            "FileHash-SHA1": 7164,
            "CVE": 40
          },
          "indicator_count": 44924,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e5d4c59f8ac3f86f615",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:16:29.659000",
          "created": "2023-12-06T16:16:29.659000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2430,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1331,
            "hostname": 2748,
            "JA3": 2,
            "email": 94,
            "CVE": 42,
            "FileHash-SHA1": 7164
          },
          "indicator_count": 45524,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e245df26a29e78d740a",
          "name": "WHO IS MOBI GAMES AKA NIC",
          "description": "",
          "modified": "2023-12-06T16:15:32.595000",
          "created": "2023-12-06T16:15:32.595000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2428,
            "FileHash-MD5": 19,
            "URL": 2378,
            "hostname": 3144,
            "FileHash-SHA256": 307,
            "email": 87,
            "CVE": 47,
            "CIDR": 1,
            "FileHash-SHA1": 6
          },
          "indicator_count": 8417,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e1db42d958b88f07ca8",
          "name": "WHO IS MOBI GAMES AKA NIC",
          "description": "",
          "modified": "2023-12-06T16:15:25.303000",
          "created": "2023-12-06T16:15:25.303000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2428,
            "FileHash-MD5": 19,
            "URL": 2378,
            "hostname": 3141,
            "FileHash-SHA256": 307,
            "email": 87,
            "CVE": 47,
            "CIDR": 1,
            "FileHash-SHA1": 6
          },
          "indicator_count": 8414,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e14974bdb5d6dbda091",
          "name": "WHO EVERYONE HAS BEEN LOOKING FOR",
          "description": "",
          "modified": "2023-12-06T16:15:16.406000",
          "created": "2023-12-06T16:15:16.406000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2066,
            "URL": 1939,
            "hostname": 2768,
            "FileHash-SHA256": 276,
            "email": 90,
            "CVE": 47,
            "CIDR": 1,
            "FileHash-MD5": 16,
            "FileHash-SHA1": 4
          },
          "indicator_count": 7207,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ded7d8a5ce8dba3444a",
          "name": "Who is SHAW.CA (TUSCOW DOMAINS)",
          "description": "",
          "modified": "2023-12-06T16:14:37.212000",
          "created": "2023-12-06T16:14:37.212000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2362,
            "FileHash-SHA256": 24578,
            "FileHash-MD5": 7241,
            "URL": 1216,
            "hostname": 2688,
            "JA3": 2,
            "email": 97,
            "CVE": 43,
            "FileHash-SHA1": 7217
          },
          "indicator_count": 45444,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709dd6926a5676de0e2a19",
          "name": "Who is SHAW.CA (TUSCOW DOMAINS)",
          "description": "",
          "modified": "2023-12-06T16:14:13.668000",
          "created": "2023-12-06T16:14:13.668000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2427,
            "FileHash-SHA256": 24528,
            "FileHash-MD5": 7187,
            "URL": 1346,
            "hostname": 2829,
            "JA3": 2,
            "email": 99,
            "CVE": 43,
            "FileHash-SHA1": 7164
          },
          "indicator_count": 45625,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ca13f7a17df14af4912",
          "name": "WHO IS NIC",
          "description": "",
          "modified": "2023-12-06T16:09:05.625000",
          "created": "2023-12-06T16:09:05.625000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2485,
            "FileHash-MD5": 39,
            "URL": 2407,
            "hostname": 3208,
            "FileHash-SHA256": 328,
            "email": 91,
            "CVE": 45,
            "CIDR": 1,
            "FileHash-SHA1": 26
          },
          "indicator_count": 8630,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a49ed44fea53e9aeec5",
          "name": "home networks",
          "description": "",
          "modified": "2023-12-06T15:59:05.075000",
          "created": "2023-12-06T15:59:05.075000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2298,
            "FileHash-SHA256": 24535,
            "FileHash-MD5": 7197,
            "URL": 1188,
            "hostname": 2636,
            "JA3": 2,
            "email": 96,
            "CVE": 44,
            "FileHash-SHA1": 7174
          },
          "indicator_count": 45170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570974f872f3ad80a8b32c7",
          "name": "TarD5B7.tmp - and all using its ioc's",
          "description": "",
          "modified": "2023-12-06T15:46:23.604000",
          "created": "2023-12-06T15:46:23.604000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 6924,
            "CVE": 4,
            "FileHash-SHA256": 24687,
            "URL": 23965,
            "domain": 6830,
            "FileHash-MD5": 943,
            "FileHash-SHA1": 395,
            "email": 67
          },
          "indicator_count": 63815,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570919f567f88c3b2dd75c6",
          "name": "twitter.com/FLDEO",
          "description": "",
          "modified": "2023-12-06T15:22:07.801000",
          "created": "2023-12-06T15:22:07.801000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1186,
            "hostname": 229,
            "domain": 132,
            "URL": 778,
            "CIDR": 4,
            "FileHash-MD5": 18
          },
          "indicator_count": 2347,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709180cc164d76aeb361cf",
          "name": "Michigan.gov ~ Tis the season to HACK elections",
          "description": "",
          "modified": "2023-12-06T15:21:36.435000",
          "created": "2023-12-06T15:21:36.435000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1530,
            "hostname": 501,
            "domain": 169,
            "URL": 1060,
            "CIDR": 3,
            "FileHash-MD5": 129
          },
          "indicator_count": 3392,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
        "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
        "CS IDS: Matches rule ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)",
        "http://mc.yandex-team.settings.storage-cloud.link/ \u2022 ru.disk-cloud.link",
        "dash.ocrobot.com \u2022 robottherobot.com \u2022http://www.robottherobot.com/",
        "Crowdsourced YARA rules: Matches rule UPX from ruleset UPX by kevoreilly",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
        "Crowdsourced IDS rules: Matches rule: MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
        "init-p01st.push.apple.com",
        "https://twitter.com/404javascript.js",
        "Researched Link: https://twitter.com/x/migrate?tok=7b2265223a222f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a7836506d37714f3248417858516d496b454864736445653851716f55426567514941784142267573673d414f76566177333047616a6b6e31444f6c50716444715861477457632532302532302f75726c3f657372633d7326713d267263743d6a2673613d552675726c3d68747470733a2f2f747769747465722e636f6d2f5265786f725663302f7374617475732f31373335353637303533363938383236343333267665643d326168554b45776a783",
        "CS Sigma: Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "https://pin.it/ [SQLi Dumper]",
        "CS IDS: Matches rule ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "Potentially disturbing , personal , invasive, aggressive, intimate behavior of party.",
        "Crowdsourced YARA rules: Matches rule win_ramnit_auto from ruleset win.ramnit_auto by Felix Bilstein - yara-signator at cocacoding dot com",
        "CS Sigma: Matches rule Disable Windows Defender Functionalities Via Registry Keys by AlertIQ, J\u00e1n Tren\u010dansk\u00fd, frack113, Nasreddine Bencherchali, Swachchhanda Shrawan",
        "nr-data.net [Apple Private Data Collection]",
        "Tam Legal \u2022 Christopher P. Ahmann Esq Cyber Criminal",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
        "msftconnecttest.com",
        "https://www.jmtstudios.org/farewell/",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "https://www.virustotal.com/gui/file/00e5aefb5ffd357e995d1a4ee30735a692780b203cd58e6239637471047d51a4/detection",
        "http://193.233.132.62/hera/amadka.exe | https://www.info-only-men.com/landing/mlp88g?subPublisher=popunder:eu-adsrv.rtbsuperhub.com&zone=popunder:eu-adsrv.rtbsuperhub.com&",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "graphql.accounts.instagram.disk- cloud.link encrynt lenter source leric everest l Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link showing system",
        "http://rfc-editor.org",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "Redirects to https://twitter.com?mx=1",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "Crowdsourced YARA rules: Matches rule MAL_Ramnit_May19_1 from ruleset crime_nansh0u by Florian Roth (Nextron Systems)",
        "CS Sigma: Matches rule Suspicious Schtasks Schedule Type With High Privileges by Nasreddine Bencherchali (Nextron Systems)",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "Block ID:\tEVA120 ?",
        "http://x.com/denverpolice/status/",
        "CS IDS: Matches rule ET MALWARE Win32/Ramnit Checkin Matches rule MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
        "https://software-free-phone-2018.win/62ae8f9b-d0cb-4b4c-8318-dd7900e1d092/e29481e9-a792-46a8-bbf0-188ed2a816ae/?brand=Apple&browser=Safari&btd=dHJr",
        "https://software-free-phone-2018.win/7a7c1101-0538-49de-925f-4f4675a5fd1f/3b0669f6-a07e-4eb8-8e2b-d0282d482c1a/?brand=Lenovo&browser=Chr",
        "https://www.youtube.com/channel/UCSYMkiAJcNXbO5-aemTSxvw",
        "CS IDS: Matches rule ET MALWARE Suspected RisePro TCP Heartbeat Packet",
        "newrelic.se    [Apple Collection]",
        "Crowdsourced IDS rules: Matches rule: (port_scan) UDP filtered",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "IDS Detections: Backdoor.Win32.Pushdo.s Checkin Backdoor.Win32.Pushdo.s Checkin Suspicious csrss.exe in URI",
        "Antivirus Detections: Backdoor:Win32/Likseput.B ,  PWS:Win32/QQpass.B!MTB ,  Trojan:Win32/Scrarev.C ,  Trojan:Win32/Speesipro.A ,  Trojan:Win32/Zombie.A ,  TrojanDownloader:Win32/Cutwail.BS ,  TrojanDownloader:Win32/Nemucod ,",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "TXTRESSE: FileHash-SHA256 00001dd58b69582cc30a16b000bce3d96d369487444385489084719676afba4d",
        "https://www.youtube.com/watch?v=GyuMozsVyYs",
        "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
        "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Activity)",
        "103.224.212.34 scanning_host",
        "CS Sigma: Matches rule Scheduled Task Creation by Florian Roth (Nextron Systems)",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "https://www.rfc-editor.org/rfc/pdfrfc/rfc7421.txt.pdf",
        "http://colorado-realestate-finder.com/",
        "ConventionEngine_Term_Dropbox \u2022 Dropbox",
        "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc%20%20/url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
        "bricked.wtf",
        "CS Sigma: Matches rule Suspicious Add Scheduled Task Parent by Florian Roth (Nextron Systems)",
        "http://apple-carry-relay.fastly-edge.com \u2022 appleid.com \u2022 charterhomeschoolacademy.appleid.com",
        "https://unify.apideck.com/vault/callback",
        "Crowdsourced IDS rules: Matches rule: ET MALWARE Win32/Ramnit Checkin | Matches rule ET DNS Query for .cc TLD",
        "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
        "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /.git/HEAD",
        "CS IDS: Matches rule (stream_tcp) data sent on stream not accepting data",
        "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "http://api.jmtstudios.org/",
        "ic1-privaterelay.appleid.com \u2022 ic2-privaterelay.appleid.com\t\u2022 ic4-privaterelay.appleid.com",
        "http://www.visitbooker.com/Dropbox-07/index.htm",
        "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
        "GoBrut Service Bruter CnC Activity",
        "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
        "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
        "https://forwardemail.net/es/blog/open-source/apple-email-clients",
        "CS IDS: Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "0-1.duckdns.org [malicious]",
        "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "https://otx.alienvault.com/pulse/6694bb9be1b61bf820500004",
        "https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8QqoUBegQIAxAB&usg=AOvVaw30Gajkn1DOlPqdDqXaGtWc /url?esrc=s&q=&rct=j&sa=U&url=https://twitter.com/RexorVc0/status/1735567053698826433&ved=2ahUKEwjx6Pm7qO2HAxXQmIkEHdsdEe8Qr4kDegQIAxAC&usg=AOvVaw3hTJ23b0U6ZvO_HwyLOEoQ",
        "Appears to be closely associated with  close relative and initial victim of attack.",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "MALWARE STEALER TROJAN EVADER | WEXTRACT.EXE .MUI | TXTRESSE | via https://www.virustotal.com/gui/domain/www.youtube.com",
        "tulach.cc [Adversarial Malware Attack Source]",
        "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
        "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Token)  Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (External IP)",
        "^ by Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems) ^",
        "Redirects to:  https://twitter.com?mx=1  IP address: 104.244.42.129  Hosting: Unknown Running on: Tsa B  CMS: Express  Powered by: Express",
        "Jays Youtube Bot.exe > FileHash-SHA256 00514527e00ee001d042",
        "https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "CS IDS: Matches rule ET MALWARE [ANY.RUN] RisePro TCP v.0.x (Exfiltration)",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
        "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "WEXTRACT.EXE .MUI: FileHash-SHA256 00e5aefb5ffd357e995d1a4ee30735a692780b203cd58e6239637471047d51a4",
        "accounts.instagram.disk-cloud.link \u2022\tgraphql.accounts.instagram.disk-cloud",
        "Framing target as a self host of malicious, malware filled templates via twitter.com migrate to X.com",
        "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
        "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "CS IDS: Matches rule (http_inspect) HTTP response has UTF character set that failed to normalize",
        "Critical CS Sigma: Matches rule Suspicious Double Extension File Execution by Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "http://pornsure.com/ \u2022  http://www.kittipornfiberglass.com/ \u2022  kittipornfiberglass.com \u2022 pornsure.com",
        "CS Sigma: Matches rule Chromium Browser Instance Executed With Custom Extension by Aedan Russell, frack113, X__Junior (Nextron Systems)",
        "TrojanDownloader:Win32/Upatre ,  Virus:Win32/Sality.AT , Win.Downloader.Small-1645",
        "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
        "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
        "https://rector-fitiology.icu/99c8d3a6-be16-421a-87a8-40701eae8149?zoneid=6543079&bannerid=18710758&browser=chrome&os=ios&devic",
        "CS IDS: Matches rule ET USER_AGENTS Microsoft Device Metadata Retrieval Client User-Agent",
        "104.200.22.130 Command and Control",
        "careersandenterprise.appleid.com \u2022 http://apple.appleid.com/",
        "interface.xpacemobilitycloud.com",
        "nr-data.net [ Hidden private Apple data collection]",
        "aig.com",
        "103.224.182.243 ghdukshop.com lb-182-243.above.comAustraliaCOUNTRYAS133618 trellian pty. limited",
        "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
        "apple-dns.net.   [Apple email collection]",
        "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Dnspionage",
            "Other malware",
            "Win.trojan.downloader-63174",
            "Wannacry",
            "Win.trojan.agent-316098",
            "Dapato",
            "Trojan:win32/vflooder",
            "Win.downloader.small-1645",
            "Win32/vflooder.b checkin",
            "Content reputation",
            "Swisyn",
            "Death bitches",
            "Zbot",
            "Remcos",
            "Win64:malwarex-gen\\ [trj]",
            "Ai:fileinfector.eaeea7850c",
            "Win.dropper.qqpass-9895638-0",
            "Alfper:refloadapihash",
            "Chaos",
            "Win64:crypterx-gen\\ [trj]",
            "Win32:malware-gen",
            "Win.malware.convagent-9981433-0",
            "Tsara brashears",
            "Amazon aes",
            "Win32:trojan-gen",
            "Win64:botx-gen\\ [trj]",
            "Mydoom",
            "Upadter",
            "Pwndlocker",
            "Trojandownloader:win32/cutwail.bs",
            "Win.trojan.agent",
            "Trojan:win32/speesipro.a",
            "Bank",
            "Agent tesla - s0331",
            "Cve jar",
            "Quasar rat",
            "Networm",
            "Trojan.msil.injurer.cbd",
            "Gafgyt",
            "Trojan:win32/scrarev.c",
            "Engineering steering",
            "Elf:agent-vw\\ [trj]",
            "Vidar",
            "Alf:e5.spikeaex.dynhash",
            "Lolkek",
            "Virus.ramnit/nimnul",
            "Maui ransomware",
            "Trojandownloader:win32/upatre",
            "Trojan:win32/detplock",
            "Apple malware",
            "Ransomexx",
            "Trojan:win32/zombie.a",
            "Trojan.crifi.1",
            "Daisy coleman",
            "Bit rat",
            "Fonepaw",
            "Dark power",
            "Gootloader",
            "Formbook",
            "Lockbit",
            "Trojan:win32/qqpass",
            "Win32:icedid-e\\ [bank]",
            "Facebook ht",
            "Qakbot",
            "Virtool:win32/injector.gen!bq",
            "Exploit:win32/cve-2017-0147",
            "Worm:win32/benjamin",
            "Raccoon",
            "Backdoor:win32/likseput.b",
            "Alf:heraklezeval:trojanspy:win32/socstealer",
            "Et",
            "Tulach malware",
            "Emotet",
            "Twitter malware",
            "Trojan:win32/upatre",
            "Ransom:win32/conticrypt",
            "Win32:rmndrp [inf]",
            "Webtoolbar",
            "Fusioncore",
            "Pws:win32/qqpass.b!mtb",
            "Autorun",
            "Trickbot - s0266",
            "Virus:win32/sality.at",
            "Clicker.bgou",
            "Artemis",
            "Trojanspy",
            "Crack",
            "Win.malware.vtflooder-6723768-0",
            "Wat:blacked-e",
            "Trojandownloader:linux/morila",
            "Trojandownloader:win32/nemucod",
            "Iesg",
            "Win.trojan.agent-752791",
            "Azorult",
            "Roblox",
            "#virtool:win32/obfuscator.adb",
            "Win32/vflooder.b vtapi dos"
          ],
          "industries": [
            "Civil society",
            "Technology",
            "Media",
            "Crime victims"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69a6667cc81826a4ae1dd3ea",
      "name": "dropbox.com",
      "description": "Verdict\nWhitelisted\nIP Address\n162.125.248.18\nLocation\n\nUnited States\nASN\nAS19679 dropbox inc.\nNameservers\nns-1949.awsdns-51.co.uk.\n, \nns-315.awsdns-39.com.\nMore\nWHOIS\nRegistrar:\nMarkMonitor, Inc.,  \nCreation Date:\nJun 27, 1995\nRelated Pulses\nOTX User-Created Pulses (50)\nRelated Tags\n1747 Related Tags\n320700\n, \n368600\n, \n1575038779\n, \ngeoip\n, \nas54113\nMore\nIndicator Facts\n997 malicious files communicating\nHistorical OTX telemetry\nRunning webserver\n105 subdomains\nFilesharing\nSPF record\nPresent in Umbrella\nPresent in Majestic\nPresent in Akamai\nAntivirus Detections\nALF:E5.SpikeAex.DYNHASH\n, \nBackdoor:Win32/Drixed.J\n, \nCan't access file\n, \nTrojan:Win32/Banload.E\n, \nTrojan:Win32/Pariham.A\nMore\nAV Detection Ratio\n997\n / 1000\nExternal Resources\nWhois, \nUrlVoid, \nVirusTotal",
      "modified": "2026-04-02T04:35:49.117000",
      "created": "2026-03-03T04:41:32.619000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 318,
        "FileHash-MD5": 1055,
        "FileHash-SHA1": 1067,
        "FileHash-SHA256": 2018,
        "email": 6,
        "hostname": 210,
        "URL": 371
      },
      "indicator_count": 5045,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 52,
      "modified_text": "17 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "692e068ff95076bb8e75bd9f",
      "name": "Telehealth Exploit",
      "description": "",
      "modified": "2025-12-31T21:02:25",
      "created": "2025-12-01T21:20:15.043000",
      "tags": [
        "passive dns",
        "urls",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "safe browsing",
        "present dec",
        "status",
        "date",
        "united",
        "name servers",
        "netherlands",
        "unknown ns",
        "ip address",
        "search",
        "showing",
        "local",
        "data upload",
        "extraction",
        "flag",
        "bad traffic",
        "et hunting",
        "domain m2",
        "suspicious tls",
        "sni request",
        "windir",
        "openurl c",
        "dns requests",
        "et info",
        "tls handshake",
        "prefetch2",
        "analysis",
        "tor analysis",
        "domain address",
        "tlsv1",
        "jfif",
        "jpeg image",
        "ascii text",
        "entries",
        "as15169",
        "show",
        "read c",
        "write",
        "next",
        "persistence",
        "execution",
        "crash",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 260,
        "hostname": 555,
        "URL": 1803,
        "FileHash-SHA256": 1437,
        "FileHash-MD5": 113,
        "FileHash-SHA1": 13,
        "email": 4,
        "SSLCertFingerprint": 18,
        "CVE": 1
      },
      "indicator_count": 4204,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "108 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69116f89c600907a25e6b397",
      "name": "GoBrut Service Bruter CnC Activity  \u2022 TAM Legal \u2022 Christopher P. Ahmann",
      "description": "Malicious attacks from Special Counsel criminal attorney defending Jeffrey Scott Reimer and Concentra against and on premises vicious SA. Caused grate bodily injury. Christopher P. Ahmann and Hall\nRender (down the street) Palantir has been harassing , working 24/7 at silencing one crime victim. I\u2019m sure there are more because we thwarted an attempt in 2018. \n\nHitman hired. You couldn\u2019t believe manpower and cyber attacks one family has been through. They attack the Large Loss clients.",
      "modified": "2025-12-10T04:02:00.145000",
      "created": "2025-11-10T04:52:25.542000",
      "tags": [
        "united",
        "ipv4",
        "america asn",
        "asn as397241",
        "neustar",
        "united states",
        "ubuntu",
        "linux x8664",
        "gobrut service",
        "bruter cnc",
        "activity",
        "malware",
        "present mar",
        "present oct",
        "present jun",
        "brazil",
        "present jul",
        "present feb",
        "present nov",
        "moved",
        "a domains",
        "win64",
        "alfper",
        "ransom",
        "script urls",
        "bank",
        "trojan",
        "win32",
        "meta",
        "path",
        "read c",
        "port",
        "destination",
        "delete",
        "write",
        "persistence",
        "execution",
        "generic",
        "hostile",
        "cookie",
        "suspicious",
        "e ee",
        "epeq",
        "efjeg",
        "eebe",
        "e ge",
        "eveoe6ee",
        "elem",
        "e ie",
        "eieeieeie",
        "jea ebjecedjee",
        "ipv4 add",
        "files",
        "reverse dns",
        "america flag",
        "msie",
        "chrome",
        "title",
        "h1 center",
        "gmt content",
        "unknown ns",
        "ip address",
        "for privacy",
        "icedid",
        "bokbot",
        "united states",
        "div div",
        "link",
        "amazon web",
        "a li",
        "click",
        "span",
        "unknown aaaa",
        "record value",
        "apache x",
        "asn as398101",
        "hosting",
        "twitter",
        "present may",
        "present jan",
        "error",
        "present sep",
        "url analysis",
        "passive dns",
        "urls",
        "less whois",
        "registrar",
        "criminal defense",
        "quasi gov",
        "tam legal",
        "monitored target",
        "p",
        "amazon",
        "apple",
        "japan unknown",
        "license",
        "expiresmon",
        "gmt path",
        "html",
        "tokyo",
        "show",
        "unknown",
        "tracking",
        "germany unknown",
        "bq nov",
        "virtool",
        "germany asn",
        "as47846",
        "cyber attacks",
        "christopher",
        "ahmann",
        "pulse pulses",
        "location united",
        "dns resolutions",
        "domains top",
        "hitmen",
        "hall",
        "hall render",
        "telper",
        "hostname add",
        "pulse submit",
        "domain",
        "files ip",
        "address",
        "yara detections",
        "contacted",
        "filehash",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "detections elf",
        "lowfi",
        "entries",
        "win32midia",
        "next associated",
        "trojanclicker",
        "win32ellell jan",
        "date"
      ],
      "references": [
        "Tam Legal \u2022 Christopher P. Ahmann Esq Cyber Criminal",
        "GoBrut Service Bruter CnC Activity",
        "interface.xpacemobilitycloud.com",
        "103.224.182.243 ghdukshop.com lb-182-243.above.comAustraliaCOUNTRYAS133618 trellian pty. limited",
        "http://pornsure.com/ \u2022  http://www.kittipornfiberglass.com/ \u2022  kittipornfiberglass.com \u2022 pornsure.com",
        "http://colorado-realestate-finder.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Linux/Morila",
          "display_name": "TrojanDownloader:Linux/Morila",
          "target": "/malware/TrojanDownloader:Linux/Morila"
        },
        {
          "id": "Gafgyt",
          "display_name": "Gafgyt",
          "target": null
        },
        {
          "id": "ELF:Agent-VW\\ [Trj]",
          "display_name": "ELF:Agent-VW\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:IcedID-E\\ [Bank]",
          "display_name": "Win32:IcedID-E\\ [Bank]",
          "target": null
        },
        {
          "id": "Win64:MalwareX-gen\\ [Trj]",
          "display_name": "Win64:MalwareX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Ransom:Win32/ContiCrypt",
          "display_name": "Ransom:Win32/ContiCrypt",
          "target": "/malware/Ransom:Win32/ContiCrypt"
        },
        {
          "id": "ALFPER:RefLoadApiHash",
          "display_name": "ALFPER:RefLoadApiHash",
          "target": null
        },
        {
          "id": "Win64:CrypterX-gen\\ [Trj]",
          "display_name": "Win64:CrypterX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win64:BotX-gen\\ [Trj]",
          "display_name": "Win64:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Bank",
          "display_name": "Bank",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Exploit:Win32/CVE-2017-0147",
          "display_name": "Exploit:Win32/CVE-2017-0147",
          "target": "/malware/Exploit:Win32/CVE-2017-0147"
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "AutoRun",
          "display_name": "AutoRun",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-316098",
          "display_name": "Win.Trojan.Agent-316098",
          "target": null
        },
        {
          "id": "virtool:Win32/Injector.gen!BQ",
          "display_name": "virtool:Win32/Injector.gen!BQ",
          "target": "/malware/virtool:Win32/Injector.gen!BQ"
        }
      ],
      "attack_ids": [
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 3031,
        "email": 8,
        "hostname": 1840,
        "FileHash-SHA256": 1015,
        "URL": 4792,
        "FileHash-MD5": 441,
        "FileHash-SHA1": 432,
        "SSLCertFingerprint": 9,
        "CVE": 1
      },
      "indicator_count": 11569,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "130 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68ee5e9f8cfc5fbc73142660",
      "name": "Gaming Studios - YouTube - MyDoom",
      "description": "",
      "modified": "2025-11-13T12:05:32.283000",
      "created": "2025-10-14T14:30:55.471000",
      "tags": [
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "ipv4",
        "enter source",
        "indicator role",
        "title added",
        "active related",
        "united",
        "present jul",
        "unknown ns",
        "search",
        "for privacy",
        "moved",
        "ip address",
        "encrypt",
        "a domains",
        "script urls",
        "meta",
        "pragma",
        "general full",
        "reverse dns",
        "software",
        "resource",
        "security tls",
        "piscataway",
        "asn20473",
        "asn15169",
        "google",
        "asvultr",
        "portfolio",
        "josh theriault",
        "upei",
        "university",
        "island",
        "roblox",
        "jmt studios",
        "moon engine",
        "android",
        "icpc",
        "north america",
        "qualifier",
        "hello",
        "apache",
        "runner",
        "eric everest",
        "games",
        "cloudflar",
        "amazon02",
        "as autonomous",
        "system",
        "canada",
        "value",
        "domainpath name",
        "cgjerrieegaggq",
        "name value",
        "form",
        "game development",
        "blog",
        "jmt99",
        "developer",
        "event",
        "bullseye",
        "trick or treat",
        "unofficial trick or treat 2014",
        "unofficial trick or treat 2015",
        "egg hunt",
        "gift hunt",
        "hallows quest",
        "studio",
        "experience",
        "fall",
        "january",
        "july",
        "founder",
        "studio head",
        "passive dns",
        "urls",
        "registrar",
        "title",
        "roblox jmt99 \"jmt studios\" \"trick or treat\" \"egg hunt\"",
        "press copyright",
        "contact",
        "privacy policy",
        "safety how",
        "youtube",
        "test",
        "nfl sunday",
        "ticket",
        "google llc",
        "data upload",
        "extraction",
        "failed",
        "files",
        "twitter",
        "variables",
        "cgjjtbieggagla",
        "nid value",
        "expiration date",
        "files ip",
        "dynamicloader",
        "write c",
        "delete c",
        "intel",
        "ms windows",
        "medium",
        "default",
        "write",
        "guard",
        "mozilla",
        "malware",
        "defender",
        "unknown",
        "domains",
        "hashes",
        "url analysis",
        "unknown aaaa",
        "script domains",
        "certificate",
        "game",
        "servers",
        "unofficial",
        "settings",
        "public",
        "endpoints",
        "currently",
        "game servers",
        "current",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "role title",
        "related pulses",
        "domain v",
        "url indicator",
        "nameilname",
        "ascii text",
        "mitre att",
        "ck id",
        "ck matrix",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "pe file",
        "high",
        "yara detections",
        "dynamic",
        "v hostname",
        "se fos",
        "include v",
        "domain url",
        "data",
        "alltypes",
        "win32mydoom oct",
        "trojan",
        "url add",
        "http",
        "related nids",
        "files location",
        "canada flag",
        "canada hostname",
        "canada unknown",
        "canada",
        "present aug",
        "name servers",
        "present sep",
        "aaaa",
        "present oct",
        "crlf line",
        "unicode text",
        "music",
        "suspicious",
        "bricked.wtf",
        "flag united",
        "google safe",
        "domain",
        "address domain",
        "united states",
        "filehashsha256",
        "hostname xn",
        "finland unknown",
        "filehashmd5",
        "indicators hong",
        "kong",
        "south korea",
        "present jun",
        "present mar",
        "present may",
        "olet",
        "cnr12",
        "tlsv1",
        "get updates",
        "upatre",
        "added active",
        "apple",
        "everest",
        "josh paul",
        "upadter",
        "convagent",
        "info stealing",
        "delete service",
        "phishing",
        "fraud",
        "social engineering",
        "gamer",
        "hacker",
        "adversaries",
        "icloud",
        "found",
        "gmt content",
        "error",
        "redacted for",
        "meta http",
        "content",
        "gmt server",
        "france unknown",
        "poland unknown",
        "content type",
        "xml title",
        "hostname add",
        "address",
        "location united",
        "life",
        "century link llc",
        "xfinity",
        "livesex",
        "domain add",
        "users",
        "show",
        "delete",
        "blocked by quad9",
        "showing",
        "record value",
        "location canada",
        "canada asn",
        "accept",
        "cookie",
        "macbook",
        "ipv4 add",
        "america flag",
        "america asn",
        "asn as714",
        "less",
        "woodynet",
        "next associated",
        "status",
        "exclude sugges",
        "ip related",
        "t1027.013"
      ],
      "references": [
        "https://www.jmtstudios.org/farewell/",
        "https://www.youtube.com/channel/UCSYMkiAJcNXbO5-aemTSxvw",
        "graphql.accounts.instagram.disk- cloud.link encrynt lenter source leric everest l Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link showing system",
        "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
        "ConventionEngine_Term_Dropbox \u2022 Dropbox",
        "http://api.jmtstudios.org/",
        "bricked.wtf",
        "ic1-privaterelay.appleid.com \u2022 ic2-privaterelay.appleid.com\t\u2022 ic4-privaterelay.appleid.com",
        "http://apple-carry-relay.fastly-edge.com \u2022 appleid.com \u2022 charterhomeschoolacademy.appleid.com",
        "careersandenterprise.appleid.com \u2022 http://apple.appleid.com/",
        "https://forwardemail.net/es/blog/open-source/apple-email-clients",
        "accounts.instagram.disk-cloud.link \u2022\tgraphql.accounts.instagram.disk-cloud",
        "http://mc.yandex-team.settings.storage-cloud.link/ \u2022 ru.disk-cloud.link",
        "http://www.visitbooker.com/Dropbox-07/index.htm",
        "dash.ocrobot.com \u2022 robottherobot.com \u2022http://www.robottherobot.com/",
        "Appears to be closely associated with  close relative and initial victim of attack.",
        "Potentially disturbing , personal , invasive, aggressive, intimate behavior of party."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Hong Kong",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Convagent-9981433-0",
          "display_name": "Win.Malware.Convagent-9981433-0",
          "target": null
        },
        {
          "id": "Upadter",
          "display_name": "Upadter",
          "target": null
        },
        {
          "id": "MyDoom",
          "display_name": "MyDoom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6996,
        "FileHash-MD5": 281,
        "FileHash-SHA1": 220,
        "FileHash-SHA256": 2673,
        "domain": 1747,
        "email": 24,
        "hostname": 2803,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 14747,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68ee5ea4d51d4a1cabdb4ee9",
      "name": "Gaming Studios - YouTube - MyDoom",
      "description": "",
      "modified": "2025-11-13T12:05:32.283000",
      "created": "2025-10-14T14:31:00.172000",
      "tags": [
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "ipv4",
        "enter source",
        "indicator role",
        "title added",
        "active related",
        "united",
        "present jul",
        "unknown ns",
        "search",
        "for privacy",
        "moved",
        "ip address",
        "encrypt",
        "a domains",
        "script urls",
        "meta",
        "pragma",
        "general full",
        "reverse dns",
        "software",
        "resource",
        "security tls",
        "piscataway",
        "asn20473",
        "asn15169",
        "google",
        "asvultr",
        "portfolio",
        "josh theriault",
        "upei",
        "university",
        "island",
        "roblox",
        "jmt studios",
        "moon engine",
        "android",
        "icpc",
        "north america",
        "qualifier",
        "hello",
        "apache",
        "runner",
        "eric everest",
        "games",
        "cloudflar",
        "amazon02",
        "as autonomous",
        "system",
        "canada",
        "value",
        "domainpath name",
        "cgjerrieegaggq",
        "name value",
        "form",
        "game development",
        "blog",
        "jmt99",
        "developer",
        "event",
        "bullseye",
        "trick or treat",
        "unofficial trick or treat 2014",
        "unofficial trick or treat 2015",
        "egg hunt",
        "gift hunt",
        "hallows quest",
        "studio",
        "experience",
        "fall",
        "january",
        "july",
        "founder",
        "studio head",
        "passive dns",
        "urls",
        "registrar",
        "title",
        "roblox jmt99 \"jmt studios\" \"trick or treat\" \"egg hunt\"",
        "press copyright",
        "contact",
        "privacy policy",
        "safety how",
        "youtube",
        "test",
        "nfl sunday",
        "ticket",
        "google llc",
        "data upload",
        "extraction",
        "failed",
        "files",
        "twitter",
        "variables",
        "cgjjtbieggagla",
        "nid value",
        "expiration date",
        "files ip",
        "dynamicloader",
        "write c",
        "delete c",
        "intel",
        "ms windows",
        "medium",
        "default",
        "write",
        "guard",
        "mozilla",
        "malware",
        "defender",
        "unknown",
        "domains",
        "hashes",
        "url analysis",
        "unknown aaaa",
        "script domains",
        "certificate",
        "game",
        "servers",
        "unofficial",
        "settings",
        "public",
        "endpoints",
        "currently",
        "game servers",
        "current",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "role title",
        "related pulses",
        "domain v",
        "url indicator",
        "nameilname",
        "ascii text",
        "mitre att",
        "ck id",
        "ck matrix",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "pe file",
        "high",
        "yara detections",
        "dynamic",
        "v hostname",
        "se fos",
        "include v",
        "domain url",
        "data",
        "alltypes",
        "win32mydoom oct",
        "trojan",
        "url add",
        "http",
        "related nids",
        "files location",
        "canada flag",
        "canada hostname",
        "canada unknown",
        "canada",
        "present aug",
        "name servers",
        "present sep",
        "aaaa",
        "present oct",
        "crlf line",
        "unicode text",
        "music",
        "suspicious",
        "bricked.wtf",
        "flag united",
        "google safe",
        "domain",
        "address domain",
        "united states",
        "filehashsha256",
        "hostname xn",
        "finland unknown",
        "filehashmd5",
        "indicators hong",
        "kong",
        "south korea",
        "present jun",
        "present mar",
        "present may",
        "olet",
        "cnr12",
        "tlsv1",
        "get updates",
        "upatre",
        "added active",
        "apple",
        "everest",
        "josh paul",
        "upadter",
        "convagent",
        "info stealing",
        "delete service",
        "phishing",
        "fraud",
        "social engineering",
        "gamer",
        "hacker",
        "adversaries",
        "icloud",
        "found",
        "gmt content",
        "error",
        "redacted for",
        "meta http",
        "content",
        "gmt server",
        "france unknown",
        "poland unknown",
        "content type",
        "xml title",
        "hostname add",
        "address",
        "location united",
        "life",
        "century link llc",
        "xfinity",
        "livesex",
        "domain add",
        "users",
        "show",
        "delete",
        "blocked by quad9",
        "showing",
        "record value",
        "location canada",
        "canada asn",
        "accept",
        "cookie",
        "macbook",
        "ipv4 add",
        "america flag",
        "america asn",
        "asn as714",
        "less",
        "woodynet",
        "next associated",
        "status",
        "exclude sugges",
        "ip related",
        "t1027.013"
      ],
      "references": [
        "https://www.jmtstudios.org/farewell/",
        "https://www.youtube.com/channel/UCSYMkiAJcNXbO5-aemTSxvw",
        "graphql.accounts.instagram.disk- cloud.link encrynt lenter source leric everest l Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link Data upload Failed Extraction failed, please try again Failed to retrieve suggested indicator for graphql.accounts.instagram.disk- cloud.link showing system",
        "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
        "ConventionEngine_Term_Dropbox \u2022 Dropbox",
        "http://api.jmtstudios.org/",
        "bricked.wtf",
        "ic1-privaterelay.appleid.com \u2022 ic2-privaterelay.appleid.com\t\u2022 ic4-privaterelay.appleid.com",
        "http://apple-carry-relay.fastly-edge.com \u2022 appleid.com \u2022 charterhomeschoolacademy.appleid.com",
        "careersandenterprise.appleid.com \u2022 http://apple.appleid.com/",
        "https://forwardemail.net/es/blog/open-source/apple-email-clients",
        "accounts.instagram.disk-cloud.link \u2022\tgraphql.accounts.instagram.disk-cloud",
        "http://mc.yandex-team.settings.storage-cloud.link/ \u2022 ru.disk-cloud.link",
        "http://www.visitbooker.com/Dropbox-07/index.htm",
        "dash.ocrobot.com \u2022 robottherobot.com \u2022http://www.robottherobot.com/",
        "Appears to be closely associated with  close relative and initial victim of attack.",
        "Potentially disturbing , personal , invasive, aggressive, intimate behavior of party."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Hong Kong",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Convagent-9981433-0",
          "display_name": "Win.Malware.Convagent-9981433-0",
          "target": null
        },
        {
          "id": "Upadter",
          "display_name": "Upadter",
          "target": null
        },
        {
          "id": "MyDoom",
          "display_name": "MyDoom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6996,
        "FileHash-MD5": 281,
        "FileHash-SHA1": 220,
        "FileHash-SHA256": 2673,
        "domain": 1747,
        "email": 24,
        "hostname": 2803,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 14747,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6608aaf7ca0e965e593ed1d4",
      "name": "MUI programu Microsoft Office Access (w j\u0119zyku angielskim) zosta\u0142o u\u017cyte do wys\u0142ania z\u0142o\u015bliwego oprogramowania na serwer w Czechach jest to pierwszy tego typu atak na komputer.                     e",
      "description": "A look back at some of the key words and phrases used to describe the situation in Italy, as \"probacja\" (or \"democrata), as they were translated into English.",
      "modified": "2025-10-17T11:03:07.034000",
      "created": "2024-03-31T00:14:47.183000",
      "tags": [
        "sha256",
        "ssdeep",
        "reputacja",
        "tworzy pliki",
        "informacje",
        "bardzo duga",
        "tworzy",
        "adresy url",
        "tworzy katalog",
        "win64",
        "ameryki",
        "typ pliku",
        "serwer nazw",
        "san jose",
        "adres",
        "digital",
        "data wyganicia",
        "csc corporate",
        "domains",
        "ca data",
        "data utworzenia",
        "dnssec"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6432,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2140,
        "hostname": 5874,
        "FileHash-SHA256": 12539,
        "FileHash-MD5": 3686,
        "FileHash-SHA1": 2751,
        "IPv4": 503,
        "URL": 10770,
        "email": 26,
        "CVE": 88,
        "YARA": 6,
        "JA3": 2,
        "IPv6": 28,
        "SSLCertFingerprint": 5,
        "BitcoinAddress": 3,
        "CIDR": 1
      },
      "indicator_count": 38422,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "184 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "689af6a1704fa2745bc8c2a3",
      "name": "Hijacked Twitter / X.com account. Phishing | Abnormal use",
      "description": "Hijacked phishing Twitter/ X.com.\nWin32/Unruy.C Activity\n#phishing #hijacked #intercoms #unruy #trojan #VTflood #malware #attack",
      "modified": "2025-09-11T08:02:36.759000",
      "created": "2025-08-12T08:09:05.642000",
      "tags": [
        "log id",
        "gmtn",
        "secure",
        "tls web",
        "passive dns",
        "urls",
        "path",
        "self",
        "encrypt",
        "ca issuers",
        "false",
        "search",
        "read c",
        "united",
        "entries",
        "show",
        "showing",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "copy",
        "write",
        "suspicious",
        "malware",
        "unknown",
        "process32nextw",
        "shellexecuteexw",
        "medium process",
        "discovery t1057",
        "t1057",
        "discovery",
        "medium",
        "locally unique",
        "identifier",
        "veailmboprd",
        "next associated",
        "ipv4 add",
        "pulse pulses",
        "files",
        "asn as13335",
        "dns resolutions",
        "domains top",
        "smoke loader",
        "trojan",
        "body",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "ssl certificate",
        "execution att",
        "show process",
        "programfiles",
        "command decode",
        "flag",
        "suricata ipv4",
        "mitre att",
        "show technique",
        "ck matrix",
        "date",
        "comspec",
        "model",
        "twitter",
        "august",
        "hybrid",
        "general",
        "click",
        "strings"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1504,
        "FileHash-SHA256": 1232,
        "SSLCertFingerprint": 14,
        "domain": 245,
        "hostname": 526,
        "FileHash-MD5": 43,
        "FileHash-SHA1": 38
      },
      "indicator_count": 3602,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "220 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68632c19dd335ce48dbc3798",
      "name": "Apple Zombie- Multi Malware/ Ransom attack affects Upscale Networks | Devices",
      "description": "Apple IoC\u2019s Isolated from Lifestyle Community\n\u2022 Win.Packer.pkr_ce1a-9980177-0\n\u2022 Antivirus Detections\nWin.Dropper.Zombie-10044469-0\n, \nTrojan:Win32/Zombie.A |\nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 polymorphic\n\u2022 procmem_yara\n\u2022 static_pe_anomaly\n\u2022 anomalous_deletefile\n#remote #device #dns #dead_host #pointers\n#active #targeting #ops #more\u2026",
      "modified": "2025-07-31T00:00:48.083000",
      "created": "2025-07-01T00:30:17.324000",
      "tags": [
        "dynamicloader",
        "vx10",
        "nxd2xebwx87",
        "wx10",
        "mxd78x8b",
        "port",
        "x0cqpyx0c",
        "delete c",
        "yara rule",
        "high",
        "tofsee",
        "grum",
        "copy",
        "stream",
        "powershell",
        "write",
        "malware",
        "push",
        "united",
        "name servers",
        "search",
        "creation date",
        "servers",
        "moved",
        "passive dns",
        "urls",
        "domain",
        "record value",
        "date",
        "body",
        "users",
        "intel",
        "ms windows",
        "pe32",
        "number",
        "pe32 executable",
        "ascii text",
        "crlf line",
        "database",
        "installer",
        "template",
        "trojan"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 202,
        "hostname": 217,
        "FileHash-SHA256": 852,
        "FileHash-MD5": 238,
        "FileHash-SHA1": 164,
        "SSLCertFingerprint": 3,
        "URL": 947,
        "email": 3
      },
      "indicator_count": 2626,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "262 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68451577ada8bb0aa0834edb",
      "name": "X - Business Social Media Account used to attack victim",
      "description": "Victims business social media accounts deleted. Used to commit malicious activity against businesses, espionage , financial abuse.",
      "modified": "2025-07-08T04:03:04.386000",
      "created": "2025-06-08T04:45:43.423000",
      "tags": [
        "trojan",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "upxoepplace",
        "pulses none",
        "related tags",
        "none file",
        "markus",
        "april",
        "win32",
        "copy",
        "usvwu",
        "usvw",
        "high",
        "medium",
        "show",
        "uss c",
        "binary file",
        "yara",
        "write",
        "delphi",
        "enigma",
        "present mar",
        "aaaa",
        "united",
        "passive dns",
        "date",
        "present nov",
        "moved",
        "urls",
        "creation date",
        "entries",
        "body",
        "trojandropper",
        "susp",
        "msr jul",
        "next associated",
        "pulse pulses",
        "mtb jun",
        "backdoor",
        "content length",
        "html document",
        "ascii text",
        "search",
        "internalname",
        "entries pe",
        "showing",
        "filehash",
        "md5 add",
        "av detections",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "pattern match",
        "size",
        "encrypt",
        "june",
        "hybrid",
        "local",
        "path",
        "click",
        "twitter",
        "strings",
        "url https",
        "url http",
        "report spam",
        "created",
        "hours ago",
        "bad actor",
        "ck ids",
        "t1057",
        "discovery",
        "t1071",
        "amer",
        "ipv4",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "china",
        "hong kong",
        "russia",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "pulses url",
        "filehashsha256",
        "url add",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "domain",
        "hostname",
        "next",
        "filehashmd5",
        "protocol",
        "t1105",
        "tool transfer",
        "t1480"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 637,
        "FileHash-SHA1": 639,
        "FileHash-SHA256": 5380,
        "domain": 676,
        "hostname": 1120,
        "URL": 1031,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 9487,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "285 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6843fe89793d0ef8e2afc34d",
      "name": "Deleted SocialMedia",
      "description": "Bad Actor Deleted SocialMedia account found in breach forum.",
      "modified": "2025-07-07T08:03:42.325000",
      "created": "2025-06-07T08:55:37.612000",
      "tags": [
        "body",
        "secure",
        "self",
        "path",
        "date sat",
        "gmt contenttype",
        "connection",
        "accept",
        "gmt pragma",
        "deny",
        "maxage34214400",
        "learn",
        "spawns",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "ssl certificate",
        "found",
        "copy sha256",
        "copy md5",
        "copy sha1",
        "sha1",
        "sha256",
        "size",
        "type data",
        "ascii text",
        "pattern match",
        "mitre att",
        "show technique",
        "ck matrix",
        "file",
        "indicator",
        "show process",
        "encrypt",
        "june",
        "hybrid",
        "local"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1628,
        "domain": 58,
        "URL": 390,
        "hostname": 204,
        "FileHash-MD5": 84,
        "FileHash-SHA1": 88,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 2456,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "286 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "fdpellets.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "fdpellets.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776617156.762752
}