{
  "type": "Domain",
  "indicator": "generically.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/generically.com",
    "alexa": "http://www.alexa.com/siteinfo/generically.com",
    "indicator": "generically.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3822749528,
      "indicator": "generically.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "69e2cc9ebd63c32d9c0392c6",
          "name": "Hidden Tear BruteForcer Clone Credit OctoSeek",
          "description": "",
          "modified": "2026-04-18T00:13:18.484000",
          "created": "2026-04-18T00:13:18.484000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "filehashsha256",
            "ipv4",
            "url http",
            "url https",
            "iocs",
            "filehashsha1",
            "next",
            "x509v3",
            "key",
            "windows",
            "write",
            "whois ssl",
            "whois whois",
            "win32",
            "198-46-194-153-host.colocrossing.com",
            "a domains",
            "a nxdomain",
            "aaaa",
            "accept",
            "adapter driver",
            "address",
            "address domain",
            "algorithm",
            "all octoseek",
            "cookie",
            "copy",
            "core",
            "domain names",
            "domain",
            "dnssec",
            "discord",
            "whois record",
            "cyberstalking",
            "d417n",
            "timestamp",
            "data",
            "subject",
            "cyberstalking",
            "creation date",
            "ipv4",
            "ip address",
            "http identifier",
            "hostname",
            "historical ssl",
            "highly targeted",
            "high level",
            "high",
            "hiddentear",
            "gmtn",
            "germany unknown",
            "location first",
            "ip files",
            "files",
            "false files",
            "eu data",
            "entries",
            "download encrypt",
            "encrypt",
            "download",
            "contacted",
            "communicating",
            "coinminer",
            "code",
            "cobalt strike",
            "cname",
            "click",
            "ca issuers",
            "issuers",
            "as133618",
            "as24940",
            "hetzner",
            "as26710",
            "icann",
            "as36352",
            "as24940 hetzner",
            "asn as133618",
            "as26710 icann",
            "apple as8075",
            "as47846",
            "as47995",
            "key algorithm",
            "united",
            "name",
            "type",
            "tsara brashears",
            "trojan",
            "key identifier",
            "key info",
            "land use",
            "link location",
            "united tls web",
            "tls web",
            "log id",
            "malvertizing",
            "malware",
            "http",
            "meekserver",
            "meta",
            "metasploit",
            "admin",
            "subject",
            "ransomware",
            "stop ransomware",
            "certificate status",
            "metro",
            "moved",
            "name servers",
            "netsupport rat",
            "number",
            "nxdomain",
            "passive dns",
            "servers",
            "server",
            "pegasus",
            "pingback",
            "submit",
            "ransom",
            "raspberry robin",
            "subject public",
            "subject key",
            "subject billing",
            "pdf broadcom",
            "pulse pulses",
            "pulse submit",
            "read c",
            "record value",
            "redacted referrer",
            "regbinary",
            "regdword",
            "registrant fax",
            "registrar",
            "registrar abuse",
            "registry domain",
            "registrar of",
            "registry policy",
            "regsetvalueexa",
            "regsetvalueexw",
            "show",
            "showing",
            "search",
            "urls",
            "script",
            "script domains",
            "scan endpoints",
            "russia unknown",
            "reverse dns",
            "resolutions",
            "nids",
            "related nids",
            "as39494 jsc",
            "body",
            "attorney james",
            "asn as133618",
            "javascript",
            "unknown",
            "url analysis",
            "unknown url",
            "url http",
            "v3 serial",
            "http",
            "as40528 icann",
            "as44273 host",
            "data center",
            "hosting",
            "vps",
            "reverse dns"
          ],
          "references": [
            "deviceinbox.com [Malware Hosting - Pegasus]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
            "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
            "103.224.182.253 [Command and Control]",
            "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": "65b60b85453c45eca795034d",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 77,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 359,
            "URL": 218,
            "SSLCertFingerprint": 2,
            "domain": 1932,
            "email": 12,
            "hostname": 528
          },
          "indicator_count": 3209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "1 day ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e77c7c488546842f94848c",
          "name": "Injection \u2022 FormBook",
          "description": "Insane",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-05T20:11:40.389000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 66,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e7832f3d5621ae81a5c4c2",
          "name": "Injection \u2022 FormBook ",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-05T20:40:15.678000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 63,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea63bd597387fdaccd36bd",
          "name": "Injection \u2022 FormBook",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-08T01:02:53.039000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eba0786d5bbd4f31a60c17",
          "name": "Injection \u2022 FormBook",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-08T23:34:16.648000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 62,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b60b85453c45eca795034d",
          "name": "Hidden Tear BruteForcer",
          "description": "\u2022 The Hidden Tear BruteForcer is a program created by Michael Gillespie that can be used to brute force the password for ransomware infections. A ransomware-like file crypter sample which can be modified for specific purposes. Features. Uses AES algorithm to encrypt files. Can be downloaded for free for anyone to download in GitHub. Many cyber criminals, lawyers, investigators and governments use this project.\n\u2022 Raspberry Robin is an activity cluster spread by external drives that leverages Windows Installer.",
          "modified": "2024-02-27T06:04:19.663000",
          "created": "2024-01-28T08:08:37.586000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "filehashsha256",
            "ipv4",
            "url http",
            "url https",
            "iocs",
            "filehashsha1",
            "next",
            "x509v3",
            "key",
            "windows",
            "write",
            "whois ssl",
            "whois whois",
            "win32",
            "198-46-194-153-host.colocrossing.com",
            "a domains",
            "a nxdomain",
            "aaaa",
            "accept",
            "adapter driver",
            "address",
            "address domain",
            "algorithm",
            "all octoseek",
            "cookie",
            "copy",
            "core",
            "domain names",
            "domain",
            "dnssec",
            "discord",
            "whois record",
            "cyberstalking",
            "d417n",
            "timestamp",
            "data",
            "subject",
            "cyberstalking",
            "creation date",
            "ipv4",
            "ip address",
            "http identifier",
            "hostname",
            "historical ssl",
            "highly targeted",
            "high level",
            "high",
            "hiddentear",
            "gmtn",
            "germany unknown",
            "location first",
            "ip files",
            "files",
            "false files",
            "eu data",
            "entries",
            "download encrypt",
            "encrypt",
            "download",
            "contacted",
            "communicating",
            "coinminer",
            "code",
            "cobalt strike",
            "cname",
            "click",
            "ca issuers",
            "issuers",
            "as133618",
            "as24940",
            "hetzner",
            "as26710",
            "icann",
            "as36352",
            "as24940 hetzner",
            "asn as133618",
            "as26710 icann",
            "apple as8075",
            "as47846",
            "as47995",
            "key algorithm",
            "united",
            "name",
            "type",
            "tsara brashears",
            "trojan",
            "key identifier",
            "key info",
            "land use",
            "link location",
            "united tls web",
            "tls web",
            "log id",
            "malvertizing",
            "malware",
            "http",
            "meekserver",
            "meta",
            "metasploit",
            "admin",
            "subject",
            "ransomware",
            "stop ransomware",
            "certificate status",
            "metro",
            "moved",
            "name servers",
            "netsupport rat",
            "number",
            "nxdomain",
            "passive dns",
            "servers",
            "server",
            "pegasus",
            "pingback",
            "submit",
            "ransom",
            "raspberry robin",
            "subject public",
            "subject key",
            "subject billing",
            "pdf broadcom",
            "pulse pulses",
            "pulse submit",
            "read c",
            "record value",
            "redacted referrer",
            "regbinary",
            "regdword",
            "registrant fax",
            "registrar",
            "registrar abuse",
            "registry domain",
            "registrar of",
            "registry policy",
            "regsetvalueexa",
            "regsetvalueexw",
            "show",
            "showing",
            "search",
            "urls",
            "script",
            "script domains",
            "scan endpoints",
            "russia unknown",
            "reverse dns",
            "resolutions",
            "nids",
            "related nids",
            "as39494 jsc",
            "body",
            "attorney james",
            "asn as133618",
            "javascript",
            "unknown",
            "url analysis",
            "unknown url",
            "url http",
            "v3 serial",
            "http",
            "as40528 icann",
            "as44273 host",
            "data center",
            "hosting",
            "vps",
            "reverse dns"
          ],
          "references": [
            "deviceinbox.com [Malware Hosting - Pegasus]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
            "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
            "103.224.182.253 [Command and Control]",
            "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 77,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 359,
            "URL": 218,
            "SSLCertFingerprint": 2,
            "domain": 1932,
            "email": 12,
            "hostname": 528
          },
          "indicator_count": 3209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "782 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8086a651e881715b3fc47",
          "name": "Hidden Tear BruteForcer",
          "description": "",
          "modified": "2024-02-27T06:04:19.663000",
          "created": "2024-01-29T20:19:54.173000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "filehashsha256",
            "ipv4",
            "url http",
            "url https",
            "iocs",
            "filehashsha1",
            "next",
            "x509v3",
            "key",
            "windows",
            "write",
            "whois ssl",
            "whois whois",
            "win32",
            "198-46-194-153-host.colocrossing.com",
            "a domains",
            "a nxdomain",
            "aaaa",
            "accept",
            "adapter driver",
            "address",
            "address domain",
            "algorithm",
            "all octoseek",
            "cookie",
            "copy",
            "core",
            "domain names",
            "domain",
            "dnssec",
            "discord",
            "whois record",
            "cyberstalking",
            "d417n",
            "timestamp",
            "data",
            "subject",
            "cyberstalking",
            "creation date",
            "ipv4",
            "ip address",
            "http identifier",
            "hostname",
            "historical ssl",
            "highly targeted",
            "high level",
            "high",
            "hiddentear",
            "gmtn",
            "germany unknown",
            "location first",
            "ip files",
            "files",
            "false files",
            "eu data",
            "entries",
            "download encrypt",
            "encrypt",
            "download",
            "contacted",
            "communicating",
            "coinminer",
            "code",
            "cobalt strike",
            "cname",
            "click",
            "ca issuers",
            "issuers",
            "as133618",
            "as24940",
            "hetzner",
            "as26710",
            "icann",
            "as36352",
            "as24940 hetzner",
            "asn as133618",
            "as26710 icann",
            "apple as8075",
            "as47846",
            "as47995",
            "key algorithm",
            "united",
            "name",
            "type",
            "tsara brashears",
            "trojan",
            "key identifier",
            "key info",
            "land use",
            "link location",
            "united tls web",
            "tls web",
            "log id",
            "malvertizing",
            "malware",
            "http",
            "meekserver",
            "meta",
            "metasploit",
            "admin",
            "subject",
            "ransomware",
            "stop ransomware",
            "certificate status",
            "metro",
            "moved",
            "name servers",
            "netsupport rat",
            "number",
            "nxdomain",
            "passive dns",
            "servers",
            "server",
            "pegasus",
            "pingback",
            "submit",
            "ransom",
            "raspberry robin",
            "subject public",
            "subject key",
            "subject billing",
            "pdf broadcom",
            "pulse pulses",
            "pulse submit",
            "read c",
            "record value",
            "redacted referrer",
            "regbinary",
            "regdword",
            "registrant fax",
            "registrar",
            "registrar abuse",
            "registry domain",
            "registrar of",
            "registry policy",
            "regsetvalueexa",
            "regsetvalueexw",
            "show",
            "showing",
            "search",
            "urls",
            "script",
            "script domains",
            "scan endpoints",
            "russia unknown",
            "reverse dns",
            "resolutions",
            "nids",
            "related nids",
            "as39494 jsc",
            "body",
            "attorney james",
            "asn as133618",
            "javascript",
            "unknown",
            "url analysis",
            "unknown url",
            "url http",
            "v3 serial",
            "http",
            "as40528 icann",
            "as44273 host",
            "data center",
            "hosting",
            "vps",
            "reverse dns"
          ],
          "references": [
            "deviceinbox.com [Malware Hosting - Pegasus]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
            "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
            "103.224.182.253 [Command and Control]",
            "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": "65b60b85453c45eca795034d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 77,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 359,
            "URL": 218,
            "SSLCertFingerprint": 2,
            "domain": 1932,
            "email": 12,
            "hostname": 528
          },
          "indicator_count": 3209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "782 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a20ff8db3854e863dca324",
          "name": "Shared Modules | Hijacker | Masquerading",
          "description": "",
          "modified": "2024-02-12T04:01:56.040000",
          "created": "2024-01-13T04:22:16.961000",
          "tags": [
            "filehashmd5",
            "no expiration",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "hostname",
            "expiration",
            "domain",
            "url https",
            "url http",
            "source",
            "stix",
            "email",
            "email abuse",
            "goreasonlimited",
            "cc no",
            "tompc",
            "sum35",
            "domain xn",
            "searchbox0",
            "domainname0",
            "view",
            "apple",
            "apple id",
            "hijacking",
            "masquerading",
            "exploit",
            "cams",
            "monitoring",
            "loki bot",
            "dns",
            "open ports",
            "malvertizing",
            "malware hosting",
            "apple script",
            "js user",
            "dga",
            "dga domains",
            "malware",
            "multiple_versions",
            "wagersta",
            "decode",
            "system information discovery",
            "decrypt",
            "evasion",
            "defense evasion",
            "emotet",
            "android",
            "ios",
            "wannacry",
            "trojan",
            "worm",
            "cyber threat",
            "benjamin",
            "whois record",
            "ssl certificate",
            "contacted",
            "historical ssl",
            "referrer",
            "contacted urls",
            "execution",
            "whois whois",
            "whois sslcert",
            "and china",
            "drop",
            "uchealth",
            "university of cincinnati health"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 2296,
            "FileHash-SHA256": 3362,
            "URL": 6191,
            "domain": 2033,
            "hostname": 3097,
            "email": 37,
            "CVE": 2
          },
          "indicator_count": 19719,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "https://www.mccormick-designs.com",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "thecomments.app",
        "applephonenw.com [governmentattic]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
        "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns",
        "deviceinbox.com [Malware Hosting - Pegasus]",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://www.sheraises.com/wcur/ [phishing]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "www.jamesbgriffinlaw.com (toolbox)",
        "72.167.124.187  [phishing]",
        "103.224.182.253 [Command and Control]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.trojan",
            "Win32:malware-gen",
            "Trojan:win32/neconyd.a",
            "Win.trojan.airinstall-1",
            "Win.trojan.zbot-64721",
            "Virtool:win32/injector.gen!bq",
            "Hiddentear",
            "Alf:heraklezeval:pua:win32/imali",
            "#lowfi:hstr:win32/airinstaller.b",
            "Artro",
            "Trojanspy:win32/nivdort",
            "Trojandownloader:win32/upatre.o",
            "Alf:jasyp:trojandownloader:win32/startpage!atmn",
            "Ransom:win32/teerac.a",
            "Trojandownloader:win32/upatre",
            "Win.dropper.remcos-9970861-0",
            "Win.trojan.nsis-41"
          ],
          "industries": [
            "Civil society"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "69e2cc9ebd63c32d9c0392c6",
      "name": "Hidden Tear BruteForcer Clone Credit OctoSeek",
      "description": "",
      "modified": "2026-04-18T00:13:18.484000",
      "created": "2026-04-18T00:13:18.484000",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "filehashsha256",
        "ipv4",
        "url http",
        "url https",
        "iocs",
        "filehashsha1",
        "next",
        "x509v3",
        "key",
        "windows",
        "write",
        "whois ssl",
        "whois whois",
        "win32",
        "198-46-194-153-host.colocrossing.com",
        "a domains",
        "a nxdomain",
        "aaaa",
        "accept",
        "adapter driver",
        "address",
        "address domain",
        "algorithm",
        "all octoseek",
        "cookie",
        "copy",
        "core",
        "domain names",
        "domain",
        "dnssec",
        "discord",
        "whois record",
        "cyberstalking",
        "d417n",
        "timestamp",
        "data",
        "subject",
        "cyberstalking",
        "creation date",
        "ipv4",
        "ip address",
        "http identifier",
        "hostname",
        "historical ssl",
        "highly targeted",
        "high level",
        "high",
        "hiddentear",
        "gmtn",
        "germany unknown",
        "location first",
        "ip files",
        "files",
        "false files",
        "eu data",
        "entries",
        "download encrypt",
        "encrypt",
        "download",
        "contacted",
        "communicating",
        "coinminer",
        "code",
        "cobalt strike",
        "cname",
        "click",
        "ca issuers",
        "issuers",
        "as133618",
        "as24940",
        "hetzner",
        "as26710",
        "icann",
        "as36352",
        "as24940 hetzner",
        "asn as133618",
        "as26710 icann",
        "apple as8075",
        "as47846",
        "as47995",
        "key algorithm",
        "united",
        "name",
        "type",
        "tsara brashears",
        "trojan",
        "key identifier",
        "key info",
        "land use",
        "link location",
        "united tls web",
        "tls web",
        "log id",
        "malvertizing",
        "malware",
        "http",
        "meekserver",
        "meta",
        "metasploit",
        "admin",
        "subject",
        "ransomware",
        "stop ransomware",
        "certificate status",
        "metro",
        "moved",
        "name servers",
        "netsupport rat",
        "number",
        "nxdomain",
        "passive dns",
        "servers",
        "server",
        "pegasus",
        "pingback",
        "submit",
        "ransom",
        "raspberry robin",
        "subject public",
        "subject key",
        "subject billing",
        "pdf broadcom",
        "pulse pulses",
        "pulse submit",
        "read c",
        "record value",
        "redacted referrer",
        "regbinary",
        "regdword",
        "registrant fax",
        "registrar",
        "registrar abuse",
        "registry domain",
        "registrar of",
        "registry policy",
        "regsetvalueexa",
        "regsetvalueexw",
        "show",
        "showing",
        "search",
        "urls",
        "script",
        "script domains",
        "scan endpoints",
        "russia unknown",
        "reverse dns",
        "resolutions",
        "nids",
        "related nids",
        "as39494 jsc",
        "body",
        "attorney james",
        "asn as133618",
        "javascript",
        "unknown",
        "url analysis",
        "unknown url",
        "url http",
        "v3 serial",
        "http",
        "as40528 icann",
        "as44273 host",
        "data center",
        "hosting",
        "vps",
        "reverse dns"
      ],
      "references": [
        "deviceinbox.com [Malware Hosting - Pegasus]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
        "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
        "103.224.182.253 [Command and Control]",
        "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": "65b60b85453c45eca795034d",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 77,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 359,
        "URL": 218,
        "SSLCertFingerprint": 2,
        "domain": 1932,
        "email": 12,
        "hostname": 528
      },
      "indicator_count": 3209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "1 day ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e77c7c488546842f94848c",
      "name": "Injection \u2022 FormBook",
      "description": "Insane",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-05T20:11:40.389000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 66,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e7832f3d5621ae81a5c4c2",
      "name": "Injection \u2022 FormBook ",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-05T20:40:15.678000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 63,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea63bd597387fdaccd36bd",
      "name": "Injection \u2022 FormBook",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-08T01:02:53.039000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 60,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eba0786d5bbd4f31a60c17",
      "name": "Injection \u2022 FormBook",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-08T23:34:16.648000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 62,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b60b85453c45eca795034d",
      "name": "Hidden Tear BruteForcer",
      "description": "\u2022 The Hidden Tear BruteForcer is a program created by Michael Gillespie that can be used to brute force the password for ransomware infections. A ransomware-like file crypter sample which can be modified for specific purposes. Features. Uses AES algorithm to encrypt files. Can be downloaded for free for anyone to download in GitHub. Many cyber criminals, lawyers, investigators and governments use this project.\n\u2022 Raspberry Robin is an activity cluster spread by external drives that leverages Windows Installer.",
      "modified": "2024-02-27T06:04:19.663000",
      "created": "2024-01-28T08:08:37.586000",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "filehashsha256",
        "ipv4",
        "url http",
        "url https",
        "iocs",
        "filehashsha1",
        "next",
        "x509v3",
        "key",
        "windows",
        "write",
        "whois ssl",
        "whois whois",
        "win32",
        "198-46-194-153-host.colocrossing.com",
        "a domains",
        "a nxdomain",
        "aaaa",
        "accept",
        "adapter driver",
        "address",
        "address domain",
        "algorithm",
        "all octoseek",
        "cookie",
        "copy",
        "core",
        "domain names",
        "domain",
        "dnssec",
        "discord",
        "whois record",
        "cyberstalking",
        "d417n",
        "timestamp",
        "data",
        "subject",
        "cyberstalking",
        "creation date",
        "ipv4",
        "ip address",
        "http identifier",
        "hostname",
        "historical ssl",
        "highly targeted",
        "high level",
        "high",
        "hiddentear",
        "gmtn",
        "germany unknown",
        "location first",
        "ip files",
        "files",
        "false files",
        "eu data",
        "entries",
        "download encrypt",
        "encrypt",
        "download",
        "contacted",
        "communicating",
        "coinminer",
        "code",
        "cobalt strike",
        "cname",
        "click",
        "ca issuers",
        "issuers",
        "as133618",
        "as24940",
        "hetzner",
        "as26710",
        "icann",
        "as36352",
        "as24940 hetzner",
        "asn as133618",
        "as26710 icann",
        "apple as8075",
        "as47846",
        "as47995",
        "key algorithm",
        "united",
        "name",
        "type",
        "tsara brashears",
        "trojan",
        "key identifier",
        "key info",
        "land use",
        "link location",
        "united tls web",
        "tls web",
        "log id",
        "malvertizing",
        "malware",
        "http",
        "meekserver",
        "meta",
        "metasploit",
        "admin",
        "subject",
        "ransomware",
        "stop ransomware",
        "certificate status",
        "metro",
        "moved",
        "name servers",
        "netsupport rat",
        "number",
        "nxdomain",
        "passive dns",
        "servers",
        "server",
        "pegasus",
        "pingback",
        "submit",
        "ransom",
        "raspberry robin",
        "subject public",
        "subject key",
        "subject billing",
        "pdf broadcom",
        "pulse pulses",
        "pulse submit",
        "read c",
        "record value",
        "redacted referrer",
        "regbinary",
        "regdword",
        "registrant fax",
        "registrar",
        "registrar abuse",
        "registry domain",
        "registrar of",
        "registry policy",
        "regsetvalueexa",
        "regsetvalueexw",
        "show",
        "showing",
        "search",
        "urls",
        "script",
        "script domains",
        "scan endpoints",
        "russia unknown",
        "reverse dns",
        "resolutions",
        "nids",
        "related nids",
        "as39494 jsc",
        "body",
        "attorney james",
        "asn as133618",
        "javascript",
        "unknown",
        "url analysis",
        "unknown url",
        "url http",
        "v3 serial",
        "http",
        "as40528 icann",
        "as44273 host",
        "data center",
        "hosting",
        "vps",
        "reverse dns"
      ],
      "references": [
        "deviceinbox.com [Malware Hosting - Pegasus]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
        "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
        "103.224.182.253 [Command and Control]",
        "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 77,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 359,
        "URL": 218,
        "SSLCertFingerprint": 2,
        "domain": 1932,
        "email": 12,
        "hostname": 528
      },
      "indicator_count": 3209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "782 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b8086a651e881715b3fc47",
      "name": "Hidden Tear BruteForcer",
      "description": "",
      "modified": "2024-02-27T06:04:19.663000",
      "created": "2024-01-29T20:19:54.173000",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "filehashsha256",
        "ipv4",
        "url http",
        "url https",
        "iocs",
        "filehashsha1",
        "next",
        "x509v3",
        "key",
        "windows",
        "write",
        "whois ssl",
        "whois whois",
        "win32",
        "198-46-194-153-host.colocrossing.com",
        "a domains",
        "a nxdomain",
        "aaaa",
        "accept",
        "adapter driver",
        "address",
        "address domain",
        "algorithm",
        "all octoseek",
        "cookie",
        "copy",
        "core",
        "domain names",
        "domain",
        "dnssec",
        "discord",
        "whois record",
        "cyberstalking",
        "d417n",
        "timestamp",
        "data",
        "subject",
        "cyberstalking",
        "creation date",
        "ipv4",
        "ip address",
        "http identifier",
        "hostname",
        "historical ssl",
        "highly targeted",
        "high level",
        "high",
        "hiddentear",
        "gmtn",
        "germany unknown",
        "location first",
        "ip files",
        "files",
        "false files",
        "eu data",
        "entries",
        "download encrypt",
        "encrypt",
        "download",
        "contacted",
        "communicating",
        "coinminer",
        "code",
        "cobalt strike",
        "cname",
        "click",
        "ca issuers",
        "issuers",
        "as133618",
        "as24940",
        "hetzner",
        "as26710",
        "icann",
        "as36352",
        "as24940 hetzner",
        "asn as133618",
        "as26710 icann",
        "apple as8075",
        "as47846",
        "as47995",
        "key algorithm",
        "united",
        "name",
        "type",
        "tsara brashears",
        "trojan",
        "key identifier",
        "key info",
        "land use",
        "link location",
        "united tls web",
        "tls web",
        "log id",
        "malvertizing",
        "malware",
        "http",
        "meekserver",
        "meta",
        "metasploit",
        "admin",
        "subject",
        "ransomware",
        "stop ransomware",
        "certificate status",
        "metro",
        "moved",
        "name servers",
        "netsupport rat",
        "number",
        "nxdomain",
        "passive dns",
        "servers",
        "server",
        "pegasus",
        "pingback",
        "submit",
        "ransom",
        "raspberry robin",
        "subject public",
        "subject key",
        "subject billing",
        "pdf broadcom",
        "pulse pulses",
        "pulse submit",
        "read c",
        "record value",
        "redacted referrer",
        "regbinary",
        "regdword",
        "registrant fax",
        "registrar",
        "registrar abuse",
        "registry domain",
        "registrar of",
        "registry policy",
        "regsetvalueexa",
        "regsetvalueexw",
        "show",
        "showing",
        "search",
        "urls",
        "script",
        "script domains",
        "scan endpoints",
        "russia unknown",
        "reverse dns",
        "resolutions",
        "nids",
        "related nids",
        "as39494 jsc",
        "body",
        "attorney james",
        "asn as133618",
        "javascript",
        "unknown",
        "url analysis",
        "unknown url",
        "url http",
        "v3 serial",
        "http",
        "as40528 icann",
        "as44273 host",
        "data center",
        "hosting",
        "vps",
        "reverse dns"
      ],
      "references": [
        "deviceinbox.com [Malware Hosting - Pegasus]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [UPX_BA, phishing, prism.exe]",
        "hedontwantyoubitch.com [hawaianairlineswifi.com DNS: honoringel]",
        "103.224.182.253 [Command and Control]",
        "198.46.194.153  [scanning host] | 198-46-194-153-host.colocrossing.com -reverse dns"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": "65b60b85453c45eca795034d",
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 77,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 359,
        "URL": 218,
        "SSLCertFingerprint": 2,
        "domain": 1932,
        "email": 12,
        "hostname": 528
      },
      "indicator_count": 3209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "782 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a20ff8db3854e863dca324",
      "name": "Shared Modules | Hijacker | Masquerading",
      "description": "",
      "modified": "2024-02-12T04:01:56.040000",
      "created": "2024-01-13T04:22:16.961000",
      "tags": [
        "filehashmd5",
        "no expiration",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "hostname",
        "expiration",
        "domain",
        "url https",
        "url http",
        "source",
        "stix",
        "email",
        "email abuse",
        "goreasonlimited",
        "cc no",
        "tompc",
        "sum35",
        "domain xn",
        "searchbox0",
        "domainname0",
        "view",
        "apple",
        "apple id",
        "hijacking",
        "masquerading",
        "exploit",
        "cams",
        "monitoring",
        "loki bot",
        "dns",
        "open ports",
        "malvertizing",
        "malware hosting",
        "apple script",
        "js user",
        "dga",
        "dga domains",
        "malware",
        "multiple_versions",
        "wagersta",
        "decode",
        "system information discovery",
        "decrypt",
        "evasion",
        "defense evasion",
        "emotet",
        "android",
        "ios",
        "wannacry",
        "trojan",
        "worm",
        "cyber threat",
        "benjamin",
        "whois record",
        "ssl certificate",
        "contacted",
        "historical ssl",
        "referrer",
        "contacted urls",
        "execution",
        "whois whois",
        "whois sslcert",
        "and china",
        "drop",
        "uchealth",
        "university of cincinnati health"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2701,
        "FileHash-SHA1": 2296,
        "FileHash-SHA256": 3362,
        "URL": 6191,
        "domain": 2033,
        "hostname": 3097,
        "email": 37,
        "CVE": 2
      },
      "indicator_count": 19719,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "797 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "generically.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "generically.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776630044.4731379
}