{
  "type": "Domain",
  "indicator": "htm.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/htm.com",
    "alexa": "http://www.alexa.com/siteinfo/htm.com",
    "indicator": "htm.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3831133160,
      "indicator": "htm.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 10,
      "pulses": [
        {
          "id": "68d7d8ee2caff74a1759380a",
          "name": "Quasar - DiabloFans.com ( packed) how a YouTube follow turned into a 12 year campaign of fear & intimidation",
          "description": "Packed with malware, rats, droppers, bots, info stealers diablofans.com matches targets description of how attack began in 10.2013. Egregious patient abuse led national medical corporation and / or quasi entity involved to attack / silence victim. Within 48 hours of disclosure\nof events causing victim to stop treating a Guy Fawkes profile with satanic name became\nvictims YouTube follower beginning 12 year + cyber warfare attack against crime victim. Overseeing MD prompted an investigation, told target she would be targeted and to hide. The website appears to be a front for very malicious activities. Several network attack began a destructive campaign against target. Many attacks and websites , parking crews involved. All tags auto populated. Many fear tactics &  attempts. . |  Description: For years, DiabloFans served as a major community hub for discussing Diablo III, posting news, and sharing character builds. (shutdown?  sold to curse.llc?)",
          "modified": "2025-10-27T11:02:05.642000",
          "created": "2025-09-27T12:30:38.161000",
          "tags": [
            "diablo",
            "builds",
            "sanctuary",
            "season",
            "diablo immortal",
            "forums",
            "interactive map",
            "diablo iii",
            "environ",
            "trier par",
            "hunt",
            "chaos",
            "altar",
            "facebook",
            "hunter",
            "data redacted",
            "server",
            "registrar abuse",
            "registrant fax",
            "contact phone",
            "registrar url",
            "admin city",
            "admin country",
            "record type",
            "ttl value",
            "thumbprint",
            "gandi sas",
            "gandi",
            "cloudflare",
            "span",
            "pattern match",
            "getprocaddress",
            "script",
            "found https",
            "path",
            "ck id",
            "magic",
            "life",
            "astaroth",
            "damage",
            "meta",
            "lucky",
            "open",
            "footer",
            "ladder",
            "rogue",
            "iframe",
            "title",
            "hell",
            "blizzard",
            "fear",
            "class",
            "nightmare",
            "june",
            "comment",
            "reload",
            "twitch",
            "hawk",
            "hydra",
            "energy",
            "school",
            "pass",
            "beast",
            "maker",
            "corpse",
            "chat",
            "hatred",
            "critical",
            "mephisto",
            "back",
            "form",
            "druid",
            "shadow",
            "scoundrel",
            "core",
            "stone",
            "freeze",
            "light",
            "speed",
            "poison",
            "conduit",
            "charm",
            "lightning",
            "close",
            "fury",
            "steam",
            "blast",
            "raven",
            "wave",
            "horn",
            "team",
            "knight",
            "elite",
            "warp",
            "premium",
            "realm",
            "skull",
            "general",
            "tracker",
            "arcane",
            "basilisk",
            "prayer",
            "black",
            "soul",
            "saboteur",
            "bone",
            "exploit",
            "carnage",
            "hellspawn",
            "ultimate",
            "spark",
            "slow",
            "frozen",
            "immortal",
            "feast",
            "entropy",
            "crazy",
            "dead",
            "heat",
            "explosive",
            "blaze",
            "solar",
            "harmony",
            "attack",
            "stealth",
            "shell",
            "mother",
            "overkill",
            "rage",
            "werewolf",
            "service",
            "anomaly",
            "drop",
            "eclipse",
            "android",
            "wind",
            "spirit",
            "face",
            "fractured",
            "pandora",
            "strange",
            "demon",
            "eternal",
            "crystal",
            "cold",
            "false",
            "window",
            "format",
            "click",
            "strings",
            "comi",
            "sector",
            "learn",
            "adversaries",
            "calls",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "reads",
            "command",
            "model",
            "stop",
            "spawns",
            "development att",
            "flag",
            "name server",
            "canada canada",
            "united",
            "enom",
            "redacted for",
            "privacy name",
            "organization",
            "script urls",
            "name servers",
            "a domains",
            "emails",
            "unknown ns",
            "sweet heart",
            "sec ch",
            "media",
            "encrypt",
            "passive dns",
            "next associated",
            "ipv4 add",
            "urls",
            "files",
            "hosting",
            "reverse dns",
            "dynamicloader",
            "high",
            "medium",
            "windows",
            "displayname",
            "tofsee",
            "yara rule",
            "loaderid",
            "startsrv",
            "lidfileupd",
            "stream",
            "port",
            "destination",
            "win64",
            "write",
            "malware",
            "ip address",
            "domain",
            "hostname add",
            "search",
            "packing t1045",
            "module load",
            "delete",
            "write c",
            "trojan",
            "win32",
            "next",
            "dns query",
            "icmp traffic",
            "moved",
            "servers",
            "germany unknown",
            "present mar",
            "accept",
            "gmt content",
            "a li",
            "main",
            "error",
            "lowfi",
            "present aug",
            "present sep",
            "present jul",
            "unknown aaaa",
            "record value",
            "content type",
            "htm align",
            "param",
            "gmt server",
            "france",
            "france unknown",
            "url analysis",
            "location france",
            "langchinese",
            "rticon",
            "pe resource",
            "t1045",
            "ascii text",
            "cape",
            "delete c",
            "redline malware",
            "guard",
            "redline",
            "defender",
            "push",
            "backdoor",
            "present apr",
            "trojandropper",
            "dns resolutions",
            "smoke loader",
            "hacktool",
            "windows auto",
            "attempts",
            "explorer",
            "win32autoit mar",
            "location united",
            "ip whois",
            "verdict",
            "entries",
            "aaaa",
            "domain add",
            "present feb",
            "present oct",
            "users",
            "yara detections",
            "recycle bin",
            "pe section",
            "as54113",
            "read",
            "copy",
            "ufffduf1a3",
            "looks",
            "xrat1",
            "quasar",
            "powershell",
            "code",
            "ids detections",
            "tls sni",
            "contacted",
            "installs",
            "checks",
            "windows startup",
            "vendor finding",
            "notes clamav",
            "files matching",
            "number",
            "http request",
            "post",
            "url host",
            "port method",
            "user agent",
            "internalsapiip",
            "okrnserver",
            "ubuntu",
            "hash",
            "alerts",
            "present jun",
            "mtb jun",
            "date",
            "cname",
            "creation date",
            "ukraine"
          ],
          "references": [
            "DiabloFans.com",
            "Every tag OTC auto populated . Crazy talk. Please see Mitre ATT&CK",
            "twitter.com \u2022 https://twitter.com/PORNO_SEXYBABES \u2022  www.pornhub.com \u2022 oriental-porno.lat",
            "https://pin.it/ \u2022  pin.it a fake Pinterest for Tsara Brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \u2022 wallpapers-nature.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022  www.sweetheartvideo.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language:",
            "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "http://www.sweetheartvideo.com/tsara-brashears  \u2022 https://www.sweetheartvideo.com/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing \u2022 www.anyxxxtube.net",
            "init.ess.apple.com \u2022otc.greatcall.com (phone manipulators) \u2022 mailtrack.io \u2022  https://trackacourier.net",
            "https://www.youtube-nocookie.com/embed/6w5ukhqvtmq",
            "https://www.youtube.com \u2022  https://www.youtube.com/user/CurseDiablofans",
            "https://www.youtube-nocookie.com/embed/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Glupteba.MT!MTB",
              "display_name": "Trojan:Win32/Glupteba.MT!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win32:CrypterX-gen\\ [Trj]",
              "display_name": "Win32:CrypterX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/VTFlooder",
              "display_name": "ALF:Trojan:Win32/VTFlooder",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Win.Dropper.Vbclone-10036195-0",
              "display_name": "Win.Dropper.Vbclone-10036195-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Worm:Win32/Vobfus",
              "display_name": "ALF:HeraklezEval:Worm:Win32/Vobfus",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "ALF:Trojan:Win32/G3nasom!imp",
              "display_name": "ALF:Trojan:Win32/G3nasom!imp",
              "target": null
            },
            {
              "id": "Unidentified 083 (AutoIT Stealer)",
              "display_name": "Unidentified 083 (AutoIT Stealer)",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1201",
              "name": "Password Policy Discovery",
              "display_name": "T1201 - Password Policy Discovery"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 656,
            "FileHash-SHA256": 2354,
            "hostname": 499,
            "URL": 1319,
            "email": 21,
            "FileHash-MD5": 766,
            "FileHash-SHA1": 748,
            "SSLCertFingerprint": 10
          },
          "indicator_count": 6373,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "175 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e47020bdbbc384d102d169",
          "name": "AWS Botnet *2nd L\u2070\u2070K \u00bb Quantum Fiber | Brute Forcer",
          "description": "I researched link again. Stealthy hackers surrounding a targets whereabouts in Denver Metro/Denver Proper (Co) and surrounding areas. Unsafe targeting activity escalates.\n\n*Tip { PDF:UrlMal-inf\\ [Trj] - https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw } Malware Families:\nWin.Dropper.LokiBot-9975730-0\n#LowFiEnableDTContinueAfterUnpacking\n#LowFiMalf_gen\nALF:PUA:Block:IObit\nALF:Program:Win32/Webcompanion\nALF:Ransom:Win32/Babax\nALF:Trojan:Win32/FormBook\nAWS\nPDF:UrlMal-inf\\ [Trj]\nTrojan:Win32/Qbot\nTrojanDownloader:Win32/Upatre\nUnix\nUnix.Malware.Generic-9875933-0\nVirTool:Win32/Injector\nVirTool:Win32/Obfuscator\nWin.Dropper.LokiBot-9975730-0\nWin.Keylogger.Banbra-9936388-0\nWorm:Win32/Mofksys",
          "modified": "2024-10-13T13:01:27.179000",
          "created": "2024-09-13T17:02:24.806000",
          "tags": [
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "dnssec",
            "email",
            "contact phone",
            "registrar iana",
            "registrar url",
            "registrar whois",
            "date",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "file type",
            "win32 exe",
            "magic pe32",
            "ms windows",
            "trid upx",
            "win16 ne",
            "generic",
            "packer",
            "info sections",
            "name virtual",
            "address virtual",
            "size raw",
            "size entropy",
            "md5 chi2",
            "upx0",
            "1 upx1",
            "upx2",
            "sysinternals",
            "zenbox",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "dynamic",
            "utc na",
            "utc facebook",
            "html info",
            "meta tags",
            "commerce cloud",
            "trackers google",
            "tag manager",
            "gtmkj5bfwx",
            "utc gtmp4hkt96",
            "utc gtm5z5w687v",
            "sample",
            "t1497",
            "sandbox evasion",
            "may sleep",
            "downloads",
            "http performs",
            "mitre att",
            "evasion ta0005",
            "upx software",
            "t1036 creates",
            "get http",
            "post http",
            "number",
            "ja3s",
            "algorithm",
            "subject",
            "data",
            "server ca",
            "odigicert inc",
            "cus lsan",
            "calls",
            "text",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "as8068",
            "united",
            "unknown",
            "ref b",
            "wed may",
            "entries",
            "mtb dec",
            "body",
            "please",
            "twitter",
            "malware",
            "trojan",
            "trojan features",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "search",
            "date hash",
            "next",
            "showing",
            "worm",
            "win32",
            "alf features",
            "aaaa",
            "cname",
            "united kingdom",
            "creation date",
            "certificate",
            "tlsv1",
            "oglobalsign",
            "stzhejiang",
            "lhangzhou",
            "oalibaba",
            "china",
            "encrypt",
            "copy",
            "write",
            "august",
            "local",
            "xport",
            "regsetvalueexa",
            "regdword",
            "regbinary",
            "medium",
            "high",
            "regsetvalueexw",
            "regsz",
            "langchinese",
            "delphi",
            "persistence",
            "execution",
            "read c",
            "create c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "write c",
            "delete c",
            "mozilla",
            "as62597 nsone",
            "domain",
            "as20940",
            "as8075",
            "virtool",
            "whitelisted ip",
            "location united",
            "asn as8068",
            "registrar",
            "markmonitor",
            "tags",
            "related tags",
            "threat roundup",
            "october",
            "historical ssl",
            "referrer",
            "round",
            "december",
            "november",
            "guloader",
            "files",
            "detections file",
            "name file",
            "file size",
            "name",
            "html",
            "cab null",
            "ubuntu",
            "linux x8664",
            "contentlength",
            "gobrut",
            "malware c",
            "c request",
            "config",
            "meta",
            "photolan",
            "moved",
            "a domains",
            "as47748 daticum",
            "meta http",
            "content",
            "gmt server",
            "ipv4",
            "pragma",
            "apache",
            "sales",
            "expiration date",
            "name servers",
            "asnone bulgaria",
            "ns nxdomain",
            "nxdomain",
            "soa nxdomain",
            "cape",
            "gobrut malware",
            "suricata",
            "et malware",
            "bruter cnc",
            "checkin",
            "activity",
            "malware config",
            "yara detections",
            "contacted",
            "a li",
            "li ul",
            "div div",
            "set cookie",
            "as29873",
            "link",
            "hong kong",
            "as45102 alibaba",
            "div li",
            "gmt max",
            "age2592000 path",
            "log id",
            "gmtn",
            "tls web",
            "ca issuers",
            "timestamp",
            "b715",
            "b59bn timestamp",
            "false",
            "as2914 ntt",
            "record value",
            "data redacted",
            "as4230 claro",
            "invalid url",
            "research group",
            "as13768 aptum",
            "canada unknown",
            "canada",
            "hostpapa",
            "hosting",
            "click",
            "rdds service",
            "record",
            "registrant",
            "admin",
            "tech contact",
            "script domains",
            "as3257 gtt",
            "asnone canada",
            "access denied",
            "servers",
            "emails",
            "as397241",
            "as31898 oracle",
            "as397240",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as15169 google",
            "as396982 google",
            "as16625 akamai",
            "as35994 akamai",
            "france",
            "discovery",
            "t1010",
            "t1012",
            "t1027",
            "information",
            "t1055",
            "injection",
            "t1057",
            "t1059",
            "ssh attacker",
            "mitm",
            "aitm",
            "tracker",
            "botnet",
            "binary",
            "ghostscript",
            "brendan coates",
            "daley",
            "trent wiltshire",
            "aws botnet",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "https",
            "salitiy",
            "unix malware",
            "created",
            "url http",
            "unix",
            "aws",
            "role title",
            "added active",
            "report spam",
            "quantumfiber",
            "denver co",
            "critical",
            "default",
            "traditional",
            "compiler",
            "intel",
            "ms windows",
            "ssdeep",
            "rich pe",
            "imphash",
            "utc gtm5z5w687v",
            "utc gtmp4hkt96",
            "pecompact",
            "packer",
            "ids",
            "commerce cloud",
            "meta tags",
            "gmt etag",
            "accept encoding",
            "accept",
            "status",
            "west domains",
            "path",
            "author avatar",
            "active file",
            "denver",
            "vt graph",
            "currently",
            "im unaware",
            "pnpd5d",
            "susp",
            "filehash",
            "av detections",
            "pecompact",
            "february",
            "asnone germany",
            "as21499 host",
            "singapore",
            "germany",
            "object",
            "alerts",
            "icmp traffic",
            "createdate",
            "microsoft color",
            "msft",
            "format",
            "as44273 host",
            "content type",
            "kodak easyshare",
            "easyshare",
            "eastman kodak",
            "kodak",
            "kukacka",
            "virus",
            "rsdsr7siwwd d",
            "install",
            "service",
            "explorer",
            "windows",
            "name type",
            "md5 process",
            "sqlite",
            "sqlite version",
            "active",
            "pre crime",
            "cyber attack",
            "hackers",
            "quantum fiber",
            "quantumfiber.com",
            "target tsara brashears",
            "tech id",
            "hallrender",
            "brian sabey",
            "hijack",
            "spotify artists",
            "idlinea8 sep",
            "xo544",
            "xa10629",
            "sitegg",
            "fcolorffffff",
            "net1",
            "inhibit system",
            "oracle",
            "level 3"
          ],
          "references": [
            "QuantumFiber.com a 2nd look",
            "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968 [OG:dorkingbeauty | Cloned: StreaminingEx]",
            "13.107.21.200 Bat.Bing - Trojan:Win32/Qbot | ALF:Ransom:Win32/Babax | Worm:Win32/Mofksys | ALF:Program:Win32/Webcompanion",
            "IDS Detections: Win32.Lexip Checkin Unsupported/Fake FireFox Version 2.",
            "IDS Detections: Windows 98 User-Agent Detected - Possible Malware or Non-Updated System Unsupported/Fake Internet Explorer Version MSIE 5.",
            "Win.Dropper.LokiBot-9975730-0",
            "Win.Dropper.LokiBot-9975730-0 FileHash-SHA256 8f65d7817731cf1b7fada1be16d85464383813dd1f0388a933cec2abbeda4ba9",
            "IDS Detections: TLS Handshake Failure Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp modifies_proxy_wpad multiple_useragents injection_resumethread",
            "Win.Keylogger.Banbra FileHash-SHA256 94517bb37a8ebe48a06a64b20237e287101bc93bbc840bf6e1ab7dfb28a2da5a",
            "Yara Detections: Delphi",
            "IDS Detections: Win32/Adware.Ymeta.A CnC Beacon Win32/Adware.Ymeta.A CnC Win32/Adware.Ymeta Variant Activity",
            "IDS Detections: Observed Suspicious UA (Mozilla/5.0) Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)",
            "Query to a *.top domain - Likely Hostile Query for .cc TLD",
            "Alerts: dead_host network_icmp nolookup_communication disables_proxy modifies_certificates modifies_proxy_wpad",
            "Alerts: ransomware_dropped_files ransomware_mass_file_delete antivm_vmware_in_instruction",
            "Unix.Malware.Generic: IDS Detections Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config",
            "Unix.Malware.Generic: Observed DNS Query for Israel Domain (.il) | Alerts: cape_detected_threat",
            "Unix.Malware.Generic: Yara Detections: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
            "Unix.Malware.Generic:",
            "Unix.Malware.Generic:",
            "networkservice.exe: Matches rule SERVER-OTHER Spring Data Commons remote code execution attempt",
            "wallet.mewards.bing.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net | wallpapers-nature.com",
            "Malware Families: Win.Dropper.LokiBot-9975730-0 #LowFiEnableDTContinueAfterUnpacking #LowFiMalf_gen Worm:Win32/Mofksys",
            "Malware Families: ALF:PUA:Block:IObit ALF:Program:Win32/Webcompanion ALF:Ransom:Win32/Babax Win.Keylogger.Banbra-9936388-0",
            "Malware Families: ALF:Trojan:Win32/FormBook AWS PDF:UrlMal-inf\\ [Trj] Trojan:Win32/Qbot Unix.Malware.Generic-9875933-0",
            "Malware Families: VirTool:Win32/Injector TrojanDownloader:Win32/Upatre Unix   VirTool:Win32/Obfuscator Win.Dropper.LokiBot-9975730-0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Keylogger.Banbra-9936388-0",
              "display_name": "Win.Keylogger.Banbra-9936388-0",
              "target": null
            },
            {
              "id": "#LowFiMalf_gen",
              "display_name": "#LowFiMalf_gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot",
              "display_name": "Trojan:Win32/Qbot",
              "target": "/malware/Trojan:Win32/Qbot"
            },
            {
              "id": "ALF:Ransom:Win32/Babax",
              "display_name": "ALF:Ransom:Win32/Babax",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys",
              "display_name": "Worm:Win32/Mofksys",
              "target": "/malware/Worm:Win32/Mofksys"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "ALF:PUA:Block:IObit",
              "display_name": "ALF:PUA:Block:IObit",
              "target": null
            },
            {
              "id": "Win.Dropper.LokiBot-9975730-0",
              "display_name": "Win.Dropper.LokiBot-9975730-0",
              "target": null
            },
            {
              "id": "Win.Dropper.LokiBot-9975730-0",
              "display_name": "Win.Dropper.LokiBot-9975730-0",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "VirTool:Win32/Injector",
              "display_name": "VirTool:Win32/Injector",
              "target": "/malware/VirTool:Win32/Injector"
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Unix.Malware.Generic-9875933-0",
              "display_name": "Unix.Malware.Generic-9875933-0",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Unix",
              "display_name": "Unix",
              "target": null
            },
            {
              "id": "AWS",
              "display_name": "AWS",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "PDF:UrlMal-inf\\ [Trj]",
              "display_name": "PDF:UrlMal-inf\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1490",
              "name": "Inhibit System Recovery",
              "display_name": "T1490 - Inhibit System Recovery"
            },
            {
              "id": "T1529",
              "name": "System Shutdown/Reboot",
              "display_name": "T1529 - System Shutdown/Reboot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1510",
              "name": "Clipboard Modification",
              "display_name": "T1510 - Clipboard Modification"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1644,
            "FileHash-SHA1": 1614,
            "FileHash-SHA256": 2742,
            "URL": 2708,
            "domain": 2150,
            "hostname": 2508,
            "email": 21,
            "SSLCertFingerprint": 33,
            "CVE": 2
          },
          "indicator_count": 13422,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "554 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e36c33f59fedbb93c0179f",
          "name": "quantumfiber - Salitiy | CnC  | Unix Malware - Hijacking | telejoint.net",
          "description": "Active file deletion. Exploring a tip re: suspected Denver superior hacker team believed related to malicious attacks on cyber crime victims and file deletion/deleted IoC's.  Excellent tip.  Related Tag: TrojanDownloader::Win32/Updatre VT graph cited in references link to pulse created by dorkingbeauty  then cloned by  streaminingex who cloned all pulses from a select group of multiple users on otx . alienvault]  Currently , Im unaware of significance. Haven't researched enough to confirm if it is an AWS botnet. If successful targeted devices will be rebooted w/ software installation. \n\n *Tip { PDF:UrlMal-inf\\ [Trj] -https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw }",
          "modified": "2024-10-12T22:02:49.628000",
          "created": "2024-09-12T22:33:23.698000",
          "tags": [
            "as3356 level",
            "united",
            "passive dns",
            "urls",
            "tlds",
            "search",
            "scan endpoints",
            "all scoreblue",
            "alerts",
            "icmp traffic",
            "daley",
            "brendan coates",
            "trent wiltshire",
            "modifydate",
            "producer gpl",
            "ghostscript",
            "write",
            "malware",
            "format",
            "filehash",
            "av detections",
            "analysis date",
            "unknown",
            "pulse submit",
            "url analysis",
            "pnpd5d",
            "win32",
            "susp",
            "sha256",
            "pecompact",
            "packer",
            "pecompact2xx",
            "related tags",
            "ids",
            "kodak easyshare",
            "easyshare",
            "kodak",
            "kukacka",
            "virus",
            "rsdsr7siwwd d",
            "install",
            "service",
            "explorer",
            "historical ssl",
            "referrer",
            "gmt content",
            "utc na",
            "utc facebook",
            "html info",
            "meta tags",
            "commerce cloud",
            "trackers google",
            "tag manager",
            "gtmkj5bfwx",
            "utc gtmp4hkt96",
            "utc gtm5z5w687v",
            "vhash",
            "authentihash",
            "imphash",
            "rich pe",
            "ssdeep",
            "file type",
            "win32 exe",
            "magic pe32",
            "ms windows",
            "intel",
            "compiler",
            "traditional",
            "default",
            "brazilian",
            "simplified",
            "rtstring french",
            "korean",
            "dos exe",
            "dll english",
            "fish chinese",
            "jpeg jpg",
            "file size",
            "detections file",
            "name",
            "win32 dll",
            "files",
            "text",
            "b pe",
            "kb graph",
            "summary",
            "hashes c2ae",
            "capa",
            "microsoft",
            "zenbox",
            "flow t1574",
            "dll sideloading",
            "deletes",
            "t1055 allocates",
            "spawns",
            "binary",
            "t1497 contains",
            "may sleep",
            "performs dns",
            "inhibit system",
            "dns resolutions",
            "ip traffic",
            "trid upx",
            "yoda",
            "crypter",
            "delphi",
            "serial number",
            "algorithm",
            "thumbprint",
            "code signing",
            "from",
            "name comodo",
            "valid from",
            "signature",
            "ms13098",
            "issuer addtrust",
            "sections",
            "sha256 file",
            "type type",
            "chi2",
            "overlay chi2",
            "t1055 spawns",
            "sample",
            "t1497 allocates",
            "http performs",
            "downloads",
            "mitre att",
            "ta0003 hijack",
            "execution flow",
            "window",
            "msie",
            "windows nt",
            "number",
            "odigicert inc",
            "cndigicert sha2",
            "server ca",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "accept",
            "high level",
            "hackers",
            "highly targeted",
            "cyber attack",
            "spotify artist",
            "gamers",
            "aws botnet",
            "precrime",
            "tracker",
            "yara",
            "united states",
            "mitm",
            "aitm",
            "domains contacted",
            "manjusaka",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "samples",
            "detection list",
            "cyber threat",
            "engineering",
            "team phishing",
            "team",
            "team covid19",
            "ssh attacker",
            "proxy",
            "hostname",
            "malicious site",
            "installcore",
            "malicious",
            "fusioncore",
            "agent",
            "zeus",
            "zbot",
            "emotet",
            "download",
            "phishing",
            "nymaim",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malicious url",
            "maltiverse",
            "artemis",
            "bank",
            "dropper",
            "target tsara brashears",
            "target virustotal",
            "target otx alienvault",
            "javascript",
            "please",
            "domain",
            "creation date",
            "date",
            "status",
            "pulse pulses",
            "as44273 host",
            "record value",
            "nxdomain",
            "content type",
            "body",
            "files show",
            "date hash",
            "avast avg",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "pragma",
            "name servers",
            "west domains",
            "ubuntu",
            "linux x8664",
            "contentlength",
            "show",
            "gobrut",
            "malware c",
            "c request",
            "encrypt",
            "config",
            "asnone germany",
            "singapore",
            "as21499 host",
            "germany",
            "object",
            "com cnt",
            "denver",
            "less see",
            "related pulses",
            "file samples",
            "files matching",
            "entries",
            "brian sabey",
            "quantumfiber.com",
            "quantum fiber",
            "man in the middle"
          ],
          "references": [
            "https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw",
            "PDF:UrlMal-inf\\ [Trj] FileHash-SHA256 30d8d75f9457b13b8e4802a6f5b2a6379616f5f2ddd0b5db18b503628a429be7",
            "Virus:Win32/Sality.AM FileHash-SHA256 538cd5aba2f96d17324b9063807a061424b921dcd6769afb210687d32276a2da",
            "TrojanDownloader:Win32/Upatre FileHash-SHA256 dbffd83df979087e6a896ddc069cb84e1cdae1cf3dccbebcc7b544778e3d76ae",
            "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968",
            "Yara Detections: Ursnif_201904 ,  aPLib ,  PECompact_2xx ,  pecompact2 ,  PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,  PECompactv2xx",
            "wallpapers-nature.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Unix.Malware.Generic-9875933-0 | FileHash-SHA256 be1c1ee886185dff2b29ab84649484e3f01a9dfe303213ff9ce3f652aa98b2b9",
            "Unix.Malware.Generic-9875933-0  | High Priority Alert: cape_detected_threat",
            "Unix -Yara: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
            "Unix -IDS Detections: Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config Observed",
            "telejoint.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1490",
              "name": "Inhibit System Recovery",
              "display_name": "T1490 - Inhibit System Recovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1529",
              "name": "System Shutdown/Reboot",
              "display_name": "T1529 - System Shutdown/Reboot"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "Civilian Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1582,
            "FileHash-SHA1": 1096,
            "FileHash-SHA256": 2123,
            "URL": 1283,
            "domain": 857,
            "hostname": 1152,
            "email": 1,
            "CVE": 1,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 8106,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "554 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eb9b88c811f35e060a2aa5",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Crimes of Tracey Richter\"",
          "description": "",
          "modified": "2024-08-14T06:01:01.267000",
          "created": "2024-03-08T23:13:12.950000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65ea64dbc3938c6472fd5e7b",
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 121,
            "FileHash-SHA1": 120,
            "FileHash-SHA256": 1086,
            "URL": 391,
            "domain": 285,
            "hostname": 369,
            "email": 1
          },
          "indicator_count": 2373,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "614 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6694bb9be1b61bf820500004",
          "name": "YouTube Creator Cyber Attacks | Jays Youtube Bot.exe | YT Botnet",
          "description": "YouTube Creator account attacks. Critical alerts, botnets, YT bots. I cannot adequately describe  attack right now.  Retaliation for targets YT channel Song Culture stems from retaliation shortly after a crime against target. Id be interested to learn more. An ITC Intercepter records traffic passed through Song Culture YouTube channel m redirects to other channels. Not reflected in the 1.5 million followers or the 3.2 million views. They just stopped. Then managing director was notified as all of Song Cultures social media Twitter, Instagram, Pinterest succumbed to Emotet attack. Social engineering did occur. Several parties. Alleged eBay , health insurance representatives, an attorney, alleged PI's music managers contacted by phone. A man from Great Britain also began an SE campaign, The strange part is following, confrontations, dangerous attacks, MIB, and other curious in person encounter, critical injuries, financial devastation has caused target to remain isolated.",
          "modified": "2024-08-14T05:03:59.815000",
          "created": "2024-07-15T06:03:07.423000",
          "tags": [
            "historical ssl",
            "referrer",
            "december",
            "sneaky server",
            "replacement",
            "unauthorized",
            "high level",
            "hackers",
            "highly targeted",
            "cyber attack",
            "emotet",
            "critical",
            "copy",
            "united",
            "command decode",
            "suricata ipv4",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "name server",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "song culture",
            "tsara lynn",
            "culture",
            "chime sa",
            "mediawarning",
            "youtube twitter",
            "secchuabitness",
            "secchuamodel",
            "secchuawow64",
            "secchuaplatform",
            "pragma",
            "form",
            "hope",
            "karma",
            "learn",
            "suspicious",
            "flag",
            "pe resource",
            "synaptics",
            "apeaksoft ios",
            "hiddentear",
            "urls",
            "domains",
            "contacted",
            "markmonitor",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "youtube bot",
            "rar jays",
            "mozilla firefox",
            "twitch",
            "samplename",
            "rar youtube",
            "zip youtube",
            "social bots",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "get https",
            "msie",
            "windows nt",
            "win64",
            "slcc2",
            "media center",
            "request",
            "gmt server",
            "referer https",
            "amd64 accept",
            "accept",
            "code",
            "rwx memory",
            "managed code",
            "calls unmanaged",
            "native",
            "often seen",
            "base64 encrypt",
            "trojan",
            "tsara brashears",
            "red team hacking",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "high",
            "medium",
            "objects",
            "regbinary",
            "module load",
            "t1129",
            "t1060",
            "crash",
            "dock",
            "persistence",
            "execution",
            "okhfjrtblzo",
            "ip check",
            "windows",
            "http host",
            "controlservice",
            "domain",
            "registry",
            "tools",
            "service",
            "worm",
            "malware",
            "win32",
            "bits",
            "read c",
            "intel",
            "ms windows",
            "pe32",
            "search",
            "type read",
            "show",
            "wow64",
            "stop",
            "write",
            "unknown",
            "waiting",
            "push",
            "next",
            "asnone united",
            "aaaa",
            "united kingdom",
            "as20738 host",
            "moved",
            "passive dns",
            "default",
            "delete c",
            "pe32 executable",
            "document file",
            "v2 document",
            "floodfix",
            "floxif",
            "name servers",
            "susp",
            "showing",
            "as55286",
            "scan endpoints",
            "all scoreblue",
            "ransom",
            "amadey",
            "songculture",
            "spreader",
            "tracey richter",
            "roberts",
            "michael roberts",
            "jays",
            "sabey",
            "rexxfield",
            "darklivity"
          ],
          "references": [
            "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
            "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
            "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
            "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
            "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
            "Ransom: message.htm.com",
            "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
            "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
            "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
            "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
            "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
            "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
            "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
            "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
            "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
            "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
            "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
            "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
            "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
            "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
            "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
            "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
            "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
            "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
            "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
            "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
            "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
            "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
            "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
            "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
            "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "W32.AIDetectMalware.CS",
              "display_name": "W32.AIDetectMalware.CS",
              "target": null
            },
            {
              "id": "Win.Virus.Pioneer-9111434-0",
              "display_name": "Win.Virus.Pioneer-9111434-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Floxif.H",
              "display_name": "Virus:Win32/Floxif.H",
              "target": "/malware/Virus:Win32/Floxif.H"
            },
            {
              "id": "Win32:Renos-KY\\ [Trj]",
              "display_name": "Win32:Renos-KY\\ [Trj]",
              "target": null
            },
            {
              "id": ",  Win.Worm.Pykspa-6057105-0",
              "display_name": ",  Win.Worm.Pykspa-6057105-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Pykspa.C",
              "display_name": "Worm:Win32/Pykspa.C",
              "target": "/malware/Worm:Win32/Pykspa.C"
            },
            {
              "id": "PUP/Hacktool",
              "display_name": "PUP/Hacktool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 439,
            "FileHash-SHA1": 386,
            "FileHash-SHA256": 2320,
            "URL": 1873,
            "domain": 478,
            "hostname": 839,
            "SSLCertFingerprint": 9,
            "email": 7
          },
          "indicator_count": 6351,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "614 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "666d1488316880c73e04054e",
          "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
          "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
          "modified": "2024-07-15T03:03:34.888000",
          "created": "2024-06-15T04:11:52.737000",
          "tags": [
            "server",
            "hostmaster",
            "amazon legal",
            "dept",
            "amazon",
            "street",
            "stateprovince",
            "postal code",
            "view whois",
            "whois record",
            "date",
            "contact",
            "threat roundup",
            "november",
            "march",
            "december",
            "february",
            "october",
            "january",
            "highly targeted",
            "data",
            "boost mobile",
            "formbook",
            "response final",
            "url https",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ord52c2 via",
            "cloudfront",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "unknown",
            "embeddedwb",
            "windows",
            "search",
            "medium",
            "united",
            "show",
            "whitelisted",
            "shellexecuteexw",
            "msie",
            "tofsee",
            "service",
            "write",
            "win32",
            "malware",
            "copy",
            "a nxdomain",
            "passive dns",
            "domain",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "ip related",
            "process32nextw",
            "components",
            "writeconsolew",
            "copy c",
            "delete c",
            "query",
            "useruin",
            "delphi",
            "capture",
            "install",
            "prorat",
            "url http",
            "http",
            "related nids",
            "files location",
            "regsetvalueexa",
            "hx88x89",
            "regbinary",
            "x95xd3xa4",
            "x8dxb7xb7",
            "hx88x9ax1e",
            "mx81xd1r",
            "x92xac",
            "xc2x84",
            "x93xaf",
            "stream",
            "persistence",
            "execution",
            "creation date",
            "entries",
            "as44273 host",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "accept",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "path",
            "pragma",
            "name servers",
            "west domains",
            "hostname",
            "next",
            "asnone germany",
            "as21499 host",
            "singapore",
            "france",
            "object",
            "com cnt",
            "dem fin",
            "found",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "levelblue",
            "open threat",
            "meta",
            "a div",
            "div div",
            "france unknown",
            "ok server",
            "type",
            "seychelles",
            "whitesky",
            "as29182 jsc",
            "showing",
            "as24940 hetzner",
            "moved",
            "expiration date",
            "aaaa",
            "russia",
            "as15169 google",
            "germany",
            "emails",
            "germany unknown",
            "a domains",
            "body doctype",
            "html public",
            "ietfdtd html",
            "finland",
            "asnone iran",
            "iran",
            "td tr",
            "td td",
            "tbody",
            "tr tr",
            "domains",
            "backdoor",
            "apple",
            "radio hacking",
            "voicestram",
            "listening",
            "trojan",
            "twitter",
            "servers",
            "vbs",
            "data center",
            "avg clamav",
            "msdefender sep",
            "vitro mar",
            "Win32:Vitro",
            "target: tsara brashears",
            "target: brashears personal devices",
            "target: whitesky communication network",
            "target: accounting firm devices",
            "targets: intellectual property",
            "redrum",
            "open",
            "tr tbody",
            "rsa ca",
            "apache",
            "as7922 comcast",
            "pulse submit",
            "url analysis",
            "epss",
            "impact",
            "cve cve20178977",
            "exploits",
            "targeted",
            "cve overview",
            "media"
          ],
          "references": [
            "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
            "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
            "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
            "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
            "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
            "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
            "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
            "message.htm.com | Ransomware",
            "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
            "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
            "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
            "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
            "Some items found relates to research exploited against or researched by target: disabled_duck",
            "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
            "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
            "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
            "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
            "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
            "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
            "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
            "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
            "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
            "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
            "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
            "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
            "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
            "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Seychelles",
            "Netherlands",
            "France",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win32:BackdoorX-gen\\ [Trj]",
              "display_name": "Win32:BackdoorX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-6840338-0",
              "display_name": "Win.Trojan.Tofsee-6840338-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dursg.K",
              "display_name": "Trojan:Win32/Dursg.K",
              "target": "/malware/Trojan:Win32/Dursg.K"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-42770",
              "display_name": "Win.Trojan.Downloader-42770",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/Nemucod.QJ",
              "display_name": "TrojanDownloader:JS/Nemucod.QJ",
              "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "Win.Trojan.Magania-13720",
              "display_name": "Win.Trojan.Magania-13720",
              "target": null
            },
            {
              "id": "Win32:Sality",
              "display_name": "Win32:Sality",
              "target": null
            },
            {
              "id": "Win.Trojan.Swisyn-6819",
              "display_name": "Win.Trojan.Swisyn-6819",
              "target": null
            },
            {
              "id": "Win32:SaliCode",
              "display_name": "Win32:SaliCode",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1313630",
              "display_name": "Win.Trojan.Agent-1313630",
              "target": null
            },
            {
              "id": "Crypt_r.BCM",
              "display_name": "Crypt_r.BCM",
              "target": null
            },
            {
              "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [
            "Retail",
            "Technology",
            "Telecommunications",
            "Civil Society",
            "Online Shopping",
            "Legal"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1965,
            "hostname": 1378,
            "domain": 1922,
            "FileHash-SHA256": 2639,
            "FileHash-MD5": 386,
            "FileHash-SHA1": 377,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 8680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "644 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "665a8d410ef48824abde85d1",
          "name": "Ransomware | Modification | Apple Data Collection | Android Modification",
          "description": "This effort seems futile. No matter how much pertinent information gathered in hopes of finding a resolution, there is a fi;e deletion campaign going on. It's affecting VirusTotal and AlienVault. \nSince governments, law firms, cyber security defense hackers and private investigators have access and abuse alt+Google, alt+virustotal and anything else that keeps them looking shiny this is a bit passive as non evident file deletion continues to occur. This is cyber warfare, best left in the hands of experienced professionals Greys & Purples. \nOnly some targeted individuals redirected to alternative, modified version of malware hunting services.",
          "modified": "2024-07-01T02:04:01.564000",
          "created": "2024-06-01T02:53:53.149000",
          "tags": [
            "utc http",
            "response final",
            "url https",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "threat roundup",
            "june",
            "october",
            "historical ssl",
            "july",
            "december",
            "apple ios",
            "mustang panda",
            "plugx",
            "cobatstrike",
            "cryptbot",
            "anubis",
            "hacktool",
            "malicious",
            "file type",
            "google safe",
            "browsing",
            "whois",
            "virustotal api",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "specific",
            "hybrid",
            "analysis",
            "antivirus",
            "pattern match",
            "hybrid analysis",
            "february",
            "sample",
            "external system",
            "network related",
            "strings",
            "contact",
            "united",
            "as15169 google",
            "status",
            "aaaa",
            "search",
            "name servers",
            "as1659 taiwan",
            "passive dns",
            "urls",
            "creation date",
            "date",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "files",
            "unknown",
            "high",
            "yara rule",
            "cape",
            "alerts",
            "checks",
            "steals",
            "internet",
            "links",
            "accountjournal",
            "neljournal",
            "april",
            "vidar",
            "read c",
            "create c",
            "default",
            "medium",
            "count",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "dock",
            "write",
            "execution",
            "next",
            "copy",
            "xport",
            "as62597 nsone",
            "entries",
            "domain",
            "showing",
            "cname",
            "body",
            "as44273 host",
            "record value",
            "nxdomain",
            "content type",
            "accept",
            "hackers"
          ],
          "references": [
            "https://www.google.com/?****client=ms-android-americamovil-us-revc+pccc=?private=false | plugin -hacked android device | Custom mods",
            "message.htm.com | Ransomware | ransomed.vc | message.htm.com | http://www.ransomed.vc | https://www.ransomed.vc",
            "File Score: 10/10 Malicious | Yara Detections: RAR_Archive",
            "Alerts: procmem_yara injection_inter_process injection_create_remote_thread antidebug_windows antisandbox_sleep antivm_generic_bios",
            "Alerts: anomalous_deletefile antidebug_guardpages dead_connect process_creation_suspicious_location infostealer_browser",
            "Alerts: antivm_vbox_keys cape_extracted_content deletes_executed_files infostealer_cookies network_bind",
            "Alerts: ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
            "nr-data.net _[Apple Private Data Collection]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://otx.alienvault.com/indicator/file/fee5e202497ecf3e0f2d829f11afe55c8c7f525cd08bf1d570a96e226bb0bdca",
            "https://otx.alienvault.com/indicator/file/201d64e8b58a429737f525a975d5da7b1c61e4b858baf4f2d2ec047f3d541338"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1560.003",
              "name": "Archive via Custom Method",
              "display_name": "T1560.003 - Archive via Custom Method"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1037.003",
              "name": "Network Logon Script",
              "display_name": "T1037.003 - Network Logon Script"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1175,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1285,
            "URL": 1244,
            "domain": 427,
            "hostname": 398,
            "CVE": 2,
            "FileHash-MD5": 15,
            "FileHash-SHA1": 8,
            "email": 4
          },
          "indicator_count": 3383,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "658 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e843669f4ba77affa4b297",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
          "description": "303 Error redirect target to desired service. | Likely using infected, updated apple Product. | Jays Youtube Bot.exe found. | Target saw episode subject, was suspicious due to 'diabolical women' connection promoted by Rexxfield[.] com (Tracey Richters ex-husband). I believe she was framed as is target I have come across. YouTube accounts are only told from the perspective of 2 ex-husbands, 1 doctor, 1 hacker and dentist[assaulter] who abused power. This trap makes targets look crazy, non credible leaving them traumatized. Attorneys or law enforcement likely  overwhelmed, wild stories. I often consider truth is can be much stranger than fiction. Fiction often loosely based on truth.",
          "modified": "2024-04-05T09:00:01.502000",
          "created": "2024-03-06T10:20:22.440000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 52,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 114,
            "FileHash-SHA256": 952,
            "URL": 285,
            "domain": 257,
            "hostname": 285,
            "email": 1
          },
          "indicator_count": 2009,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea64dbc3938c6472fd5e7b",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"  Crimes of Tracey Richter",
          "description": "",
          "modified": "2024-04-05T09:00:01.502000",
          "created": "2024-03-08T01:07:39.514000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e843669f4ba77affa4b297",
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 114,
            "FileHash-SHA256": 952,
            "URL": 285,
            "domain": 257,
            "hostname": 285,
            "email": 1
          },
          "indicator_count": 2009,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "745 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b5c5ebba25ca46fc5b36bc",
          "name": "NSO Group Pegasus spyware found attack a US citizen. Silencing",
          "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\n\u2022NSO Group develops best-in-class technology to help government agencies detect and prevent terrorism and crime.\n\u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. \nNon terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
          "modified": "2024-03-27T00:05:34.925000",
          "created": "2024-01-28T03:11:39.752000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "october",
            "august",
            "september",
            "november",
            "april",
            "march",
            "tsara brashears",
            "copy",
            "execution",
            "metro",
            "awful",
            "attack",
            "quasar",
            "malicious",
            "crypto",
            "contact",
            "contacted",
            "pe resource",
            "communicating",
            "pegasus",
            "bundled",
            "historical ssl",
            "cellbrite",
            "core",
            "startpage",
            "ursnif",
            "amadey",
            "probe",
            "targets sa",
            "survivor",
            "referrer",
            "whois whois",
            "whois ssl",
            "apple",
            "status",
            "creation date",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse submit",
            "date",
            "next",
            "et exploit",
            "probe ms17010",
            "smbds ipc",
            "show",
            "service",
            "entries",
            "msf style",
            "generic flags",
            "pe32",
            "exploit",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "eternalblue",
            "playgame",
            "bitcoin",
            "virgin islands",
            "as19905",
            "record value",
            "unknown",
            "body",
            "meta",
            "error",
            "united",
            "as7922 comcast",
            "x ua",
            "ipv4",
            "pulse pulses",
            "files",
            "moved",
            "title",
            "gmt content",
            "cookie",
            "as15169 google",
            "mtb jan",
            "otx telemetry",
            "query",
            "trojan",
            "msr jan",
            "as29580 a1",
            "domain",
            "showing",
            "as8866",
            "cellebrite",
            "aaaa",
            "russia unknown",
            "dnssec",
            "nxdomain",
            "a domains",
            "download",
            "accept",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ios",
            "ireland",
            "servers",
            "msie",
            "chrome",
            "certificate",
            "hostname",
            "url analysis",
            "http response",
            "final url",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers date",
            "connection",
            "date sat",
            "html info",
            "forbidden",
            "google tag",
            "utc aw741566034",
            "utc redirection",
            "asnone united",
            "as54113",
            "cname",
            "script urls",
            "as19527 google",
            "as35280 acorus",
            "encrypt",
            "reverse dns",
            "location dublin",
            "domain name",
            "emails",
            "as23724",
            "as4812 china",
            "china",
            "win32mydoom jan",
            "ransom",
            "worm",
            "as4808 china",
            "browse scan",
            "endpoints all",
            "login",
            "sign up",
            "tulach",
            "c-67-181-73-197.hsd1.ca.comcast.net",
            "social engineering",
            "contact made by mark brian sabey",
            "contact made by o'dea",
            "benjamin c"
          ],
          "references": [
            "enterprise.cellebrite.com [ digitalclues.com]",
            "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
            "https://tulach.cc/ [malware engineering | phishing]",
            "deviceinbox.com [malware hosting]",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://timersys.com/ [ phishing | deb opera.com]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
            "message.htm.com [ message stealer]",
            "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
            "https://www.nsogroup.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
            "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
            "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
            "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
            "training001.blackbagtech.com [opportunity?]",
            "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
            "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
            "Tracking: 8.8.4.4 [ NOT a false.positive]",
            "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
            "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Virgin Islands, British"
          ],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Mydoom",
              "display_name": "Backdoor:Win32/Mydoom",
              "target": "/malware/Backdoor:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4655,
            "URL": 9981,
            "FileHash-MD5": 219,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 6722,
            "hostname": 4341,
            "CVE": 2,
            "email": 12,
            "BitcoinAddress": 3
          },
          "indicator_count": 26148,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "754 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
        "Unix -IDS Detections: Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config Observed",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
        "message.htm.com | Ransomware",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "init.ess.apple.com \u2022otc.greatcall.com (phone manipulators) \u2022 mailtrack.io \u2022  https://trackacourier.net",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "Alerts: anomalous_deletefile antidebug_guardpages dead_connect process_creation_suspicious_location infostealer_browser",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
        "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "Unix.Malware.Generic: Yara Detections: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "Unix.Malware.Generic-9875933-0 | FileHash-SHA256 be1c1ee886185dff2b29ab84649484e3f01a9dfe303213ff9ce3f652aa98b2b9",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "training001.blackbagtech.com [opportunity?]",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "https://pin.it/ \u2022  pin.it a fake Pinterest for Tsara Brashears",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing \u2022 www.anyxxxtube.net",
        "DiabloFans.com",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "Alerts: antivm_vbox_keys cape_extracted_content deletes_executed_files infostealer_cookies network_bind",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "https://www.google.com/?****client=ms-android-americamovil-us-revc+pccc=?private=false | plugin -hacked android device | Custom mods",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "Attempted to send viewer to own server.",
        "Malware Families: ALF:Trojan:Win32/FormBook AWS PDF:UrlMal-inf\\ [Trj] Trojan:Win32/Qbot Unix.Malware.Generic-9875933-0",
        "Query to a *.top domain - Likely Hostile Query for .cc TLD",
        "telejoint.net",
        "Alerts: dead_host network_icmp nolookup_communication disables_proxy modifies_certificates modifies_proxy_wpad",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
        "wallpapers-nature.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "enterprise.cellebrite.com [ digitalclues.com]",
        "https://tulach.cc/ [malware engineering | phishing]",
        "Unix.Malware.Generic: IDS Detections Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
        "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language:",
        "Unix.Malware.Generic:",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "http://www.sweetheartvideo.com/tsara-brashears  \u2022 https://www.sweetheartvideo.com/tsara-brashears",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "PDF:UrlMal-inf\\ [Trj] FileHash-SHA256 30d8d75f9457b13b8e4802a6f5b2a6379616f5f2ddd0b5db18b503628a429be7",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Alerts: ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "TrojanDownloader:Win32/Upatre FileHash-SHA256 dbffd83df979087e6a896ddc069cb84e1cdae1cf3dccbebcc7b544778e3d76ae",
        "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "message.htm.com [ message stealer]",
        "https://otx.alienvault.com/indicator/file/201d64e8b58a429737f525a975d5da7b1c61e4b858baf4f2d2ec047f3d541338",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
        "wallet.mewards.bing.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net | wallpapers-nature.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net",
        "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "Amadey: IP 104.26.5.15",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "How about stop harming people",
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "QuantumFiber.com a 2nd look",
        "Malware Families: Win.Dropper.LokiBot-9975730-0 #LowFiEnableDTContinueAfterUnpacking #LowFiMalf_gen Worm:Win32/Mofksys",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
        "IDS Detections: Windows 98 User-Agent Detected - Possible Malware or Non-Updated System Unsupported/Fake Internet Explorer Version MSIE 5.",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Malware Families: ALF:PUA:Block:IObit ALF:Program:Win32/Webcompanion ALF:Ransom:Win32/Babax Win.Keylogger.Banbra-9936388-0",
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "Unix -Yara: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "Yara Detections: Delphi",
        "IDS Detections: Observed Suspicious UA (Mozilla/5.0) Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)",
        "https://www.nsogroup.com",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
        "IDS Detections: Win32.Lexip Checkin Unsupported/Fake FireFox Version 2.",
        "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "twitter.com \u2022 https://twitter.com/PORNO_SEXYBABES \u2022  www.pornhub.com \u2022 oriental-porno.lat",
        "Alerts: procmem_yara injection_inter_process injection_create_remote_thread antidebug_windows antisandbox_sleep antivm_generic_bios",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://otx.alienvault.com/indicator/file/fee5e202497ecf3e0f2d829f11afe55c8c7f525cd08bf1d570a96e226bb0bdca",
        "Unix.Malware.Generic-9875933-0  | High Priority Alert: cape_detected_threat",
        "networkservice.exe: Matches rule SERVER-OTHER Spring Data Commons remote code execution attempt",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "Alerts: network_icmp modifies_proxy_wpad multiple_useragents injection_resumethread",
        "Alerts: ransomware_dropped_files ransomware_mass_file_delete antivm_vmware_in_instruction",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "Malware Families: VirTool:Win32/Injector TrojanDownloader:Win32/Upatre Unix   VirTool:Win32/Obfuscator Win.Dropper.LokiBot-9975730-0",
        "deviceinbox.com [malware hosting]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Win.Dropper.LokiBot-9975730-0",
        "Win.Keylogger.Banbra FileHash-SHA256 94517bb37a8ebe48a06a64b20237e287101bc93bbc840bf6e1ab7dfb28a2da5a",
        "https://www.sweetheartvideo.com/tsara-brashears/ \u2022  www.sweetheartvideo.com",
        "Unix.Malware.Generic: Observed DNS Query for Israel Domain (.il) | Alerts: cape_detected_threat",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \u2022 wallpapers-nature.com",
        "Every tag OTC auto populated . Crazy talk. Please see Mitre ATT&CK",
        "IDS Detections: Win32/Adware.Ymeta.A CnC Beacon Win32/Adware.Ymeta.A CnC Win32/Adware.Ymeta Variant Activity",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "File Score: 10/10 Malicious | Yara Detections: RAR_Archive",
        "IDS Detections: TLS Handshake Failure Yara Detections: Nullsoft_NSIS",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "https://www.youtube-nocookie.com/embed/6w5ukhqvtmq",
        "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
        "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
        "Virus:Win32/Sality.AM FileHash-SHA256 538cd5aba2f96d17324b9063807a061424b921dcd6769afb210687d32276a2da",
        "13.107.21.200 Bat.Bing - Trojan:Win32/Qbot | ALF:Ransom:Win32/Babax | Worm:Win32/Mofksys | ALF:Program:Win32/Webcompanion",
        "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
        "https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw",
        "Win.Dropper.LokiBot-9975730-0 FileHash-SHA256 8f65d7817731cf1b7fada1be16d85464383813dd1f0388a933cec2abbeda4ba9",
        "Yara Detections: Ursnif_201904 ,  aPLib ,  PECompact_2xx ,  pecompact2 ,  PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,  PECompactv2xx",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968 [OG:dorkingbeauty | Cloned: StreaminingEx]",
        "nr-data.net _[Apple Private Data Collection]",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "Ransom: message.htm.com",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "https://www.youtube-nocookie.com/embed/",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "message.htm.com | Ransomware | ransomed.vc | message.htm.com | http://www.ransomed.vc | https://www.ransomed.vc",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
        "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
        "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
        "https://www.youtube.com \u2022  https://www.youtube.com/user/CurseDiablofans",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "NSO Group"
          ],
          "malware_families": [
            "Win.dropper.vbclone-10036195-0",
            "Amadey",
            "Win32:crypterx-gen\\ [trj]",
            "Aws",
            "Smoke loader",
            "Alf:trojan:win32/vtflooder",
            "Trojandownloader:win32/upatre",
            "Backdoor:win32/mydoom",
            "Trojan.win32.snovir.kfmibf",
            "Eternalblue",
            "Alf:ransom:win32/babax",
            "Win32:renos-ky\\ [trj]",
            "Win.dropper.lokibot-9975730-0",
            "Virtool:win32/obfuscator",
            "#lowfimalf_gen",
            "Trojan:win32/qbot",
            "Win.packer.pkr_ce1a-9980177-0",
            "Backdoor.xtreme",
            "Virtool:win32/injector",
            "Win.trojan.magania-13720",
            ",  win.worm.pykspa-6057105-0",
            "Alf:trojan:win32/g3nasom!imp",
            "Quasar",
            "Win.trojan.tofsee-6840338-0",
            "Alf:pua:block:iobit",
            "Trojan:win32/dursg.k",
            "Pup/hacktool",
            "Pdf:urlmal-inf\\ [trj]",
            "Unix",
            "Unidentified 083 (autoit stealer)",
            "Win.virus.pioneer-9111434-0",
            "Worm:win32/pykspa.c",
            "Crypt_r.bcm",
            "Pegasus",
            "Backdoor:win32/tofsee.t",
            "Virus:win32/floxif.h",
            "Alf:heraklezeval:worm:win32/vobfus",
            "Win32:backdoorx-gen\\ [trj]",
            "Win32:sality",
            "Win.trojan.swisyn-6819",
            "Alf:exploit:o97m/cve-2017-8977",
            "Win32:kamso",
            "Trojan:win32/glupteba.mt!mtb",
            "Quasar rat",
            "Trojan:win32/danabot",
            "Worm:win32/mofksys",
            "Trojandownloader:js/nemucod.qj",
            "Tofsee",
            "Win.trojan.agent-1313630",
            "#lowfienabledtcontinueafterunpacking",
            "Hacktool",
            "Unix.malware.generic-9875933-0",
            "Alf:trojan:win32/formbook",
            "Win32:trojan-gen",
            "Emotet",
            "Alf:aggr:exploit:o97m/cve-2017-11882",
            "Win32:salicode",
            "Win.keylogger.banbra-9936388-0",
            "Win.trojan.downloader-42770",
            "Alf:program:win32/webcompanion",
            "W32.aidetectmalware.cs"
          ],
          "industries": [
            "Online shopping",
            "Retail",
            "Civil society",
            "Telecommunications",
            "Technology",
            "Civilian society",
            "Legal"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 10,
  "pulses": [
    {
      "id": "68d7d8ee2caff74a1759380a",
      "name": "Quasar - DiabloFans.com ( packed) how a YouTube follow turned into a 12 year campaign of fear & intimidation",
      "description": "Packed with malware, rats, droppers, bots, info stealers diablofans.com matches targets description of how attack began in 10.2013. Egregious patient abuse led national medical corporation and / or quasi entity involved to attack / silence victim. Within 48 hours of disclosure\nof events causing victim to stop treating a Guy Fawkes profile with satanic name became\nvictims YouTube follower beginning 12 year + cyber warfare attack against crime victim. Overseeing MD prompted an investigation, told target she would be targeted and to hide. The website appears to be a front for very malicious activities. Several network attack began a destructive campaign against target. Many attacks and websites , parking crews involved. All tags auto populated. Many fear tactics &  attempts. . |  Description: For years, DiabloFans served as a major community hub for discussing Diablo III, posting news, and sharing character builds. (shutdown?  sold to curse.llc?)",
      "modified": "2025-10-27T11:02:05.642000",
      "created": "2025-09-27T12:30:38.161000",
      "tags": [
        "diablo",
        "builds",
        "sanctuary",
        "season",
        "diablo immortal",
        "forums",
        "interactive map",
        "diablo iii",
        "environ",
        "trier par",
        "hunt",
        "chaos",
        "altar",
        "facebook",
        "hunter",
        "data redacted",
        "server",
        "registrar abuse",
        "registrant fax",
        "contact phone",
        "registrar url",
        "admin city",
        "admin country",
        "record type",
        "ttl value",
        "thumbprint",
        "gandi sas",
        "gandi",
        "cloudflare",
        "span",
        "pattern match",
        "getprocaddress",
        "script",
        "found https",
        "path",
        "ck id",
        "magic",
        "life",
        "astaroth",
        "damage",
        "meta",
        "lucky",
        "open",
        "footer",
        "ladder",
        "rogue",
        "iframe",
        "title",
        "hell",
        "blizzard",
        "fear",
        "class",
        "nightmare",
        "june",
        "comment",
        "reload",
        "twitch",
        "hawk",
        "hydra",
        "energy",
        "school",
        "pass",
        "beast",
        "maker",
        "corpse",
        "chat",
        "hatred",
        "critical",
        "mephisto",
        "back",
        "form",
        "druid",
        "shadow",
        "scoundrel",
        "core",
        "stone",
        "freeze",
        "light",
        "speed",
        "poison",
        "conduit",
        "charm",
        "lightning",
        "close",
        "fury",
        "steam",
        "blast",
        "raven",
        "wave",
        "horn",
        "team",
        "knight",
        "elite",
        "warp",
        "premium",
        "realm",
        "skull",
        "general",
        "tracker",
        "arcane",
        "basilisk",
        "prayer",
        "black",
        "soul",
        "saboteur",
        "bone",
        "exploit",
        "carnage",
        "hellspawn",
        "ultimate",
        "spark",
        "slow",
        "frozen",
        "immortal",
        "feast",
        "entropy",
        "crazy",
        "dead",
        "heat",
        "explosive",
        "blaze",
        "solar",
        "harmony",
        "attack",
        "stealth",
        "shell",
        "mother",
        "overkill",
        "rage",
        "werewolf",
        "service",
        "anomaly",
        "drop",
        "eclipse",
        "android",
        "wind",
        "spirit",
        "face",
        "fractured",
        "pandora",
        "strange",
        "demon",
        "eternal",
        "crystal",
        "cold",
        "false",
        "window",
        "format",
        "click",
        "strings",
        "comi",
        "sector",
        "learn",
        "adversaries",
        "calls",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "reads",
        "command",
        "model",
        "stop",
        "spawns",
        "development att",
        "flag",
        "name server",
        "canada canada",
        "united",
        "enom",
        "redacted for",
        "privacy name",
        "organization",
        "script urls",
        "name servers",
        "a domains",
        "emails",
        "unknown ns",
        "sweet heart",
        "sec ch",
        "media",
        "encrypt",
        "passive dns",
        "next associated",
        "ipv4 add",
        "urls",
        "files",
        "hosting",
        "reverse dns",
        "dynamicloader",
        "high",
        "medium",
        "windows",
        "displayname",
        "tofsee",
        "yara rule",
        "loaderid",
        "startsrv",
        "lidfileupd",
        "stream",
        "port",
        "destination",
        "win64",
        "write",
        "malware",
        "ip address",
        "domain",
        "hostname add",
        "search",
        "packing t1045",
        "module load",
        "delete",
        "write c",
        "trojan",
        "win32",
        "next",
        "dns query",
        "icmp traffic",
        "moved",
        "servers",
        "germany unknown",
        "present mar",
        "accept",
        "gmt content",
        "a li",
        "main",
        "error",
        "lowfi",
        "present aug",
        "present sep",
        "present jul",
        "unknown aaaa",
        "record value",
        "content type",
        "htm align",
        "param",
        "gmt server",
        "france",
        "france unknown",
        "url analysis",
        "location france",
        "langchinese",
        "rticon",
        "pe resource",
        "t1045",
        "ascii text",
        "cape",
        "delete c",
        "redline malware",
        "guard",
        "redline",
        "defender",
        "push",
        "backdoor",
        "present apr",
        "trojandropper",
        "dns resolutions",
        "smoke loader",
        "hacktool",
        "windows auto",
        "attempts",
        "explorer",
        "win32autoit mar",
        "location united",
        "ip whois",
        "verdict",
        "entries",
        "aaaa",
        "domain add",
        "present feb",
        "present oct",
        "users",
        "yara detections",
        "recycle bin",
        "pe section",
        "as54113",
        "read",
        "copy",
        "ufffduf1a3",
        "looks",
        "xrat1",
        "quasar",
        "powershell",
        "code",
        "ids detections",
        "tls sni",
        "contacted",
        "installs",
        "checks",
        "windows startup",
        "vendor finding",
        "notes clamav",
        "files matching",
        "number",
        "http request",
        "post",
        "url host",
        "port method",
        "user agent",
        "internalsapiip",
        "okrnserver",
        "ubuntu",
        "hash",
        "alerts",
        "present jun",
        "mtb jun",
        "date",
        "cname",
        "creation date",
        "ukraine"
      ],
      "references": [
        "DiabloFans.com",
        "Every tag OTC auto populated . Crazy talk. Please see Mitre ATT&CK",
        "twitter.com \u2022 https://twitter.com/PORNO_SEXYBABES \u2022  www.pornhub.com \u2022 oriental-porno.lat",
        "https://pin.it/ \u2022  pin.it a fake Pinterest for Tsara Brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \u2022 wallpapers-nature.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ \u2022  www.sweetheartvideo.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language:",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "http://www.sweetheartvideo.com/tsara-brashears  \u2022 https://www.sweetheartvideo.com/tsara-brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing \u2022 www.anyxxxtube.net",
        "init.ess.apple.com \u2022otc.greatcall.com (phone manipulators) \u2022 mailtrack.io \u2022  https://trackacourier.net",
        "https://www.youtube-nocookie.com/embed/6w5ukhqvtmq",
        "https://www.youtube.com \u2022  https://www.youtube.com/user/CurseDiablofans",
        "https://www.youtube-nocookie.com/embed/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Glupteba.MT!MTB",
          "display_name": "Trojan:Win32/Glupteba.MT!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win32:CrypterX-gen\\ [Trj]",
          "display_name": "Win32:CrypterX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/VTFlooder",
          "display_name": "ALF:Trojan:Win32/VTFlooder",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Win.Dropper.Vbclone-10036195-0",
          "display_name": "Win.Dropper.Vbclone-10036195-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Worm:Win32/Vobfus",
          "display_name": "ALF:HeraklezEval:Worm:Win32/Vobfus",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "ALF:Trojan:Win32/G3nasom!imp",
          "display_name": "ALF:Trojan:Win32/G3nasom!imp",
          "target": null
        },
        {
          "id": "Unidentified 083 (AutoIT Stealer)",
          "display_name": "Unidentified 083 (AutoIT Stealer)",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1201",
          "name": "Password Policy Discovery",
          "display_name": "T1201 - Password Policy Discovery"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 656,
        "FileHash-SHA256": 2354,
        "hostname": 499,
        "URL": 1319,
        "email": 21,
        "FileHash-MD5": 766,
        "FileHash-SHA1": 748,
        "SSLCertFingerprint": 10
      },
      "indicator_count": 6373,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "175 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e47020bdbbc384d102d169",
      "name": "AWS Botnet *2nd L\u2070\u2070K \u00bb Quantum Fiber | Brute Forcer",
      "description": "I researched link again. Stealthy hackers surrounding a targets whereabouts in Denver Metro/Denver Proper (Co) and surrounding areas. Unsafe targeting activity escalates.\n\n*Tip { PDF:UrlMal-inf\\ [Trj] - https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw } Malware Families:\nWin.Dropper.LokiBot-9975730-0\n#LowFiEnableDTContinueAfterUnpacking\n#LowFiMalf_gen\nALF:PUA:Block:IObit\nALF:Program:Win32/Webcompanion\nALF:Ransom:Win32/Babax\nALF:Trojan:Win32/FormBook\nAWS\nPDF:UrlMal-inf\\ [Trj]\nTrojan:Win32/Qbot\nTrojanDownloader:Win32/Upatre\nUnix\nUnix.Malware.Generic-9875933-0\nVirTool:Win32/Injector\nVirTool:Win32/Obfuscator\nWin.Dropper.LokiBot-9975730-0\nWin.Keylogger.Banbra-9936388-0\nWorm:Win32/Mofksys",
      "modified": "2024-10-13T13:01:27.179000",
      "created": "2024-09-13T17:02:24.806000",
      "tags": [
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "dnssec",
        "email",
        "contact phone",
        "registrar iana",
        "registrar url",
        "registrar whois",
        "date",
        "vhash",
        "authentihash",
        "imphash",
        "ssdeep",
        "file type",
        "win32 exe",
        "magic pe32",
        "ms windows",
        "trid upx",
        "win16 ne",
        "generic",
        "packer",
        "info sections",
        "name virtual",
        "address virtual",
        "size raw",
        "size entropy",
        "md5 chi2",
        "upx0",
        "1 upx1",
        "upx2",
        "sysinternals",
        "zenbox",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "dynamic",
        "utc na",
        "utc facebook",
        "html info",
        "meta tags",
        "commerce cloud",
        "trackers google",
        "tag manager",
        "gtmkj5bfwx",
        "utc gtmp4hkt96",
        "utc gtm5z5w687v",
        "sample",
        "t1497",
        "sandbox evasion",
        "may sleep",
        "downloads",
        "http performs",
        "mitre att",
        "evasion ta0005",
        "upx software",
        "t1036 creates",
        "get http",
        "post http",
        "number",
        "ja3s",
        "algorithm",
        "subject",
        "data",
        "server ca",
        "odigicert inc",
        "cus lsan",
        "calls",
        "text",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "as8068",
        "united",
        "unknown",
        "ref b",
        "wed may",
        "entries",
        "mtb dec",
        "body",
        "please",
        "twitter",
        "malware",
        "trojan",
        "trojan features",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "search",
        "date hash",
        "next",
        "showing",
        "worm",
        "win32",
        "alf features",
        "aaaa",
        "cname",
        "united kingdom",
        "creation date",
        "certificate",
        "tlsv1",
        "oglobalsign",
        "stzhejiang",
        "lhangzhou",
        "oalibaba",
        "china",
        "encrypt",
        "copy",
        "write",
        "august",
        "local",
        "xport",
        "regsetvalueexa",
        "regdword",
        "regbinary",
        "medium",
        "high",
        "regsetvalueexw",
        "regsz",
        "langchinese",
        "delphi",
        "persistence",
        "execution",
        "read c",
        "create c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "write c",
        "delete c",
        "mozilla",
        "as62597 nsone",
        "domain",
        "as20940",
        "as8075",
        "virtool",
        "whitelisted ip",
        "location united",
        "asn as8068",
        "registrar",
        "markmonitor",
        "tags",
        "related tags",
        "threat roundup",
        "october",
        "historical ssl",
        "referrer",
        "round",
        "december",
        "november",
        "guloader",
        "files",
        "detections file",
        "name file",
        "file size",
        "name",
        "html",
        "cab null",
        "ubuntu",
        "linux x8664",
        "contentlength",
        "gobrut",
        "malware c",
        "c request",
        "config",
        "meta",
        "photolan",
        "moved",
        "a domains",
        "as47748 daticum",
        "meta http",
        "content",
        "gmt server",
        "ipv4",
        "pragma",
        "apache",
        "sales",
        "expiration date",
        "name servers",
        "asnone bulgaria",
        "ns nxdomain",
        "nxdomain",
        "soa nxdomain",
        "cape",
        "gobrut malware",
        "suricata",
        "et malware",
        "bruter cnc",
        "checkin",
        "activity",
        "malware config",
        "yara detections",
        "contacted",
        "a li",
        "li ul",
        "div div",
        "set cookie",
        "as29873",
        "link",
        "hong kong",
        "as45102 alibaba",
        "div li",
        "gmt max",
        "age2592000 path",
        "log id",
        "gmtn",
        "tls web",
        "ca issuers",
        "timestamp",
        "b715",
        "b59bn timestamp",
        "false",
        "as2914 ntt",
        "record value",
        "data redacted",
        "as4230 claro",
        "invalid url",
        "research group",
        "as13768 aptum",
        "canada unknown",
        "canada",
        "hostpapa",
        "hosting",
        "click",
        "rdds service",
        "record",
        "registrant",
        "admin",
        "tech contact",
        "script domains",
        "as3257 gtt",
        "asnone canada",
        "access denied",
        "servers",
        "emails",
        "as397241",
        "as31898 oracle",
        "as397240",
        "overview ip",
        "flag united",
        "hostname",
        "files domain",
        "as15169 google",
        "as396982 google",
        "as16625 akamai",
        "as35994 akamai",
        "france",
        "discovery",
        "t1010",
        "t1012",
        "t1027",
        "information",
        "t1055",
        "injection",
        "t1057",
        "t1059",
        "ssh attacker",
        "mitm",
        "aitm",
        "tracker",
        "botnet",
        "binary",
        "ghostscript",
        "brendan coates",
        "daley",
        "trent wiltshire",
        "aws botnet",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "https",
        "salitiy",
        "unix malware",
        "created",
        "url http",
        "unix",
        "aws",
        "role title",
        "added active",
        "report spam",
        "quantumfiber",
        "denver co",
        "critical",
        "default",
        "traditional",
        "compiler",
        "intel",
        "ms windows",
        "ssdeep",
        "rich pe",
        "imphash",
        "utc gtm5z5w687v",
        "utc gtmp4hkt96",
        "pecompact",
        "packer",
        "ids",
        "commerce cloud",
        "meta tags",
        "gmt etag",
        "accept encoding",
        "accept",
        "status",
        "west domains",
        "path",
        "author avatar",
        "active file",
        "denver",
        "vt graph",
        "currently",
        "im unaware",
        "pnpd5d",
        "susp",
        "filehash",
        "av detections",
        "pecompact",
        "february",
        "asnone germany",
        "as21499 host",
        "singapore",
        "germany",
        "object",
        "alerts",
        "icmp traffic",
        "createdate",
        "microsoft color",
        "msft",
        "format",
        "as44273 host",
        "content type",
        "kodak easyshare",
        "easyshare",
        "eastman kodak",
        "kodak",
        "kukacka",
        "virus",
        "rsdsr7siwwd d",
        "install",
        "service",
        "explorer",
        "windows",
        "name type",
        "md5 process",
        "sqlite",
        "sqlite version",
        "active",
        "pre crime",
        "cyber attack",
        "hackers",
        "quantum fiber",
        "quantumfiber.com",
        "target tsara brashears",
        "tech id",
        "hallrender",
        "brian sabey",
        "hijack",
        "spotify artists",
        "idlinea8 sep",
        "xo544",
        "xa10629",
        "sitegg",
        "fcolorffffff",
        "net1",
        "inhibit system",
        "oracle",
        "level 3"
      ],
      "references": [
        "QuantumFiber.com a 2nd look",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968 [OG:dorkingbeauty | Cloned: StreaminingEx]",
        "13.107.21.200 Bat.Bing - Trojan:Win32/Qbot | ALF:Ransom:Win32/Babax | Worm:Win32/Mofksys | ALF:Program:Win32/Webcompanion",
        "IDS Detections: Win32.Lexip Checkin Unsupported/Fake FireFox Version 2.",
        "IDS Detections: Windows 98 User-Agent Detected - Possible Malware or Non-Updated System Unsupported/Fake Internet Explorer Version MSIE 5.",
        "Win.Dropper.LokiBot-9975730-0",
        "Win.Dropper.LokiBot-9975730-0 FileHash-SHA256 8f65d7817731cf1b7fada1be16d85464383813dd1f0388a933cec2abbeda4ba9",
        "IDS Detections: TLS Handshake Failure Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp modifies_proxy_wpad multiple_useragents injection_resumethread",
        "Win.Keylogger.Banbra FileHash-SHA256 94517bb37a8ebe48a06a64b20237e287101bc93bbc840bf6e1ab7dfb28a2da5a",
        "Yara Detections: Delphi",
        "IDS Detections: Win32/Adware.Ymeta.A CnC Beacon Win32/Adware.Ymeta.A CnC Win32/Adware.Ymeta Variant Activity",
        "IDS Detections: Observed Suspicious UA (Mozilla/5.0) Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)",
        "Query to a *.top domain - Likely Hostile Query for .cc TLD",
        "Alerts: dead_host network_icmp nolookup_communication disables_proxy modifies_certificates modifies_proxy_wpad",
        "Alerts: ransomware_dropped_files ransomware_mass_file_delete antivm_vmware_in_instruction",
        "Unix.Malware.Generic: IDS Detections Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config",
        "Unix.Malware.Generic: Observed DNS Query for Israel Domain (.il) | Alerts: cape_detected_threat",
        "Unix.Malware.Generic: Yara Detections: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "Unix.Malware.Generic:",
        "Unix.Malware.Generic:",
        "networkservice.exe: Matches rule SERVER-OTHER Spring Data Commons remote code execution attempt",
        "wallet.mewards.bing.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net | wallpapers-nature.com",
        "Malware Families: Win.Dropper.LokiBot-9975730-0 #LowFiEnableDTContinueAfterUnpacking #LowFiMalf_gen Worm:Win32/Mofksys",
        "Malware Families: ALF:PUA:Block:IObit ALF:Program:Win32/Webcompanion ALF:Ransom:Win32/Babax Win.Keylogger.Banbra-9936388-0",
        "Malware Families: ALF:Trojan:Win32/FormBook AWS PDF:UrlMal-inf\\ [Trj] Trojan:Win32/Qbot Unix.Malware.Generic-9875933-0",
        "Malware Families: VirTool:Win32/Injector TrojanDownloader:Win32/Upatre Unix   VirTool:Win32/Obfuscator Win.Dropper.LokiBot-9975730-0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Keylogger.Banbra-9936388-0",
          "display_name": "Win.Keylogger.Banbra-9936388-0",
          "target": null
        },
        {
          "id": "#LowFiMalf_gen",
          "display_name": "#LowFiMalf_gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot",
          "display_name": "Trojan:Win32/Qbot",
          "target": "/malware/Trojan:Win32/Qbot"
        },
        {
          "id": "ALF:Ransom:Win32/Babax",
          "display_name": "ALF:Ransom:Win32/Babax",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys",
          "display_name": "Worm:Win32/Mofksys",
          "target": "/malware/Worm:Win32/Mofksys"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "ALF:PUA:Block:IObit",
          "display_name": "ALF:PUA:Block:IObit",
          "target": null
        },
        {
          "id": "Win.Dropper.LokiBot-9975730-0",
          "display_name": "Win.Dropper.LokiBot-9975730-0",
          "target": null
        },
        {
          "id": "Win.Dropper.LokiBot-9975730-0",
          "display_name": "Win.Dropper.LokiBot-9975730-0",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "VirTool:Win32/Injector",
          "display_name": "VirTool:Win32/Injector",
          "target": "/malware/VirTool:Win32/Injector"
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Unix.Malware.Generic-9875933-0",
          "display_name": "Unix.Malware.Generic-9875933-0",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Unix",
          "display_name": "Unix",
          "target": null
        },
        {
          "id": "AWS",
          "display_name": "AWS",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "PDF:UrlMal-inf\\ [Trj]",
          "display_name": "PDF:UrlMal-inf\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1490",
          "name": "Inhibit System Recovery",
          "display_name": "T1490 - Inhibit System Recovery"
        },
        {
          "id": "T1529",
          "name": "System Shutdown/Reboot",
          "display_name": "T1529 - System Shutdown/Reboot"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1510",
          "name": "Clipboard Modification",
          "display_name": "T1510 - Clipboard Modification"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1644,
        "FileHash-SHA1": 1614,
        "FileHash-SHA256": 2742,
        "URL": 2708,
        "domain": 2150,
        "hostname": 2508,
        "email": 21,
        "SSLCertFingerprint": 33,
        "CVE": 2
      },
      "indicator_count": 13422,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "554 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e36c33f59fedbb93c0179f",
      "name": "quantumfiber - Salitiy | CnC  | Unix Malware - Hijacking | telejoint.net",
      "description": "Active file deletion. Exploring a tip re: suspected Denver superior hacker team believed related to malicious attacks on cyber crime victims and file deletion/deleted IoC's.  Excellent tip.  Related Tag: TrojanDownloader::Win32/Updatre VT graph cited in references link to pulse created by dorkingbeauty  then cloned by  streaminingex who cloned all pulses from a select group of multiple users on otx . alienvault]  Currently , Im unaware of significance. Haven't researched enough to confirm if it is an AWS botnet. If successful targeted devices will be rebooted w/ software installation. \n\n *Tip { PDF:UrlMal-inf\\ [Trj] -https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw }",
      "modified": "2024-10-12T22:02:49.628000",
      "created": "2024-09-12T22:33:23.698000",
      "tags": [
        "as3356 level",
        "united",
        "passive dns",
        "urls",
        "tlds",
        "search",
        "scan endpoints",
        "all scoreblue",
        "alerts",
        "icmp traffic",
        "daley",
        "brendan coates",
        "trent wiltshire",
        "modifydate",
        "producer gpl",
        "ghostscript",
        "write",
        "malware",
        "format",
        "filehash",
        "av detections",
        "analysis date",
        "unknown",
        "pulse submit",
        "url analysis",
        "pnpd5d",
        "win32",
        "susp",
        "sha256",
        "pecompact",
        "packer",
        "pecompact2xx",
        "related tags",
        "ids",
        "kodak easyshare",
        "easyshare",
        "kodak",
        "kukacka",
        "virus",
        "rsdsr7siwwd d",
        "install",
        "service",
        "explorer",
        "historical ssl",
        "referrer",
        "gmt content",
        "utc na",
        "utc facebook",
        "html info",
        "meta tags",
        "commerce cloud",
        "trackers google",
        "tag manager",
        "gtmkj5bfwx",
        "utc gtmp4hkt96",
        "utc gtm5z5w687v",
        "vhash",
        "authentihash",
        "imphash",
        "rich pe",
        "ssdeep",
        "file type",
        "win32 exe",
        "magic pe32",
        "ms windows",
        "intel",
        "compiler",
        "traditional",
        "default",
        "brazilian",
        "simplified",
        "rtstring french",
        "korean",
        "dos exe",
        "dll english",
        "fish chinese",
        "jpeg jpg",
        "file size",
        "detections file",
        "name",
        "win32 dll",
        "files",
        "text",
        "b pe",
        "kb graph",
        "summary",
        "hashes c2ae",
        "capa",
        "microsoft",
        "zenbox",
        "flow t1574",
        "dll sideloading",
        "deletes",
        "t1055 allocates",
        "spawns",
        "binary",
        "t1497 contains",
        "may sleep",
        "performs dns",
        "inhibit system",
        "dns resolutions",
        "ip traffic",
        "trid upx",
        "yoda",
        "crypter",
        "delphi",
        "serial number",
        "algorithm",
        "thumbprint",
        "code signing",
        "from",
        "name comodo",
        "valid from",
        "signature",
        "ms13098",
        "issuer addtrust",
        "sections",
        "sha256 file",
        "type type",
        "chi2",
        "overlay chi2",
        "t1055 spawns",
        "sample",
        "t1497 allocates",
        "http performs",
        "downloads",
        "mitre att",
        "ta0003 hijack",
        "execution flow",
        "window",
        "msie",
        "windows nt",
        "number",
        "odigicert inc",
        "cndigicert sha2",
        "server ca",
        "cus cndigicert",
        "tls rsa",
        "ca1 odigicert",
        "accept",
        "high level",
        "hackers",
        "highly targeted",
        "cyber attack",
        "spotify artist",
        "gamers",
        "aws botnet",
        "precrime",
        "tracker",
        "yara",
        "united states",
        "mitm",
        "aitm",
        "domains contacted",
        "manjusaka",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "ip summary",
        "samples",
        "detection list",
        "cyber threat",
        "engineering",
        "team phishing",
        "team",
        "team covid19",
        "ssh attacker",
        "proxy",
        "hostname",
        "malicious site",
        "installcore",
        "malicious",
        "fusioncore",
        "agent",
        "zeus",
        "zbot",
        "emotet",
        "download",
        "phishing",
        "nymaim",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "malicious url",
        "maltiverse",
        "artemis",
        "bank",
        "dropper",
        "target tsara brashears",
        "target virustotal",
        "target otx alienvault",
        "javascript",
        "please",
        "domain",
        "creation date",
        "date",
        "status",
        "pulse pulses",
        "as44273 host",
        "record value",
        "nxdomain",
        "content type",
        "body",
        "files show",
        "date hash",
        "avast avg",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "ipv4",
        "pragma",
        "name servers",
        "west domains",
        "ubuntu",
        "linux x8664",
        "contentlength",
        "show",
        "gobrut",
        "malware c",
        "c request",
        "encrypt",
        "config",
        "asnone germany",
        "singapore",
        "as21499 host",
        "germany",
        "object",
        "com cnt",
        "denver",
        "less see",
        "related pulses",
        "file samples",
        "files matching",
        "entries",
        "brian sabey",
        "quantumfiber.com",
        "quantum fiber",
        "man in the middle"
      ],
      "references": [
        "https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw",
        "PDF:UrlMal-inf\\ [Trj] FileHash-SHA256 30d8d75f9457b13b8e4802a6f5b2a6379616f5f2ddd0b5db18b503628a429be7",
        "Virus:Win32/Sality.AM FileHash-SHA256 538cd5aba2f96d17324b9063807a061424b921dcd6769afb210687d32276a2da",
        "TrojanDownloader:Win32/Upatre FileHash-SHA256 dbffd83df979087e6a896ddc069cb84e1cdae1cf3dccbebcc7b544778e3d76ae",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968",
        "Yara Detections: Ursnif_201904 ,  aPLib ,  PECompact_2xx ,  pecompact2 ,  PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,  PECompactv2xx",
        "wallpapers-nature.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Unix.Malware.Generic-9875933-0 | FileHash-SHA256 be1c1ee886185dff2b29ab84649484e3f01a9dfe303213ff9ce3f652aa98b2b9",
        "Unix.Malware.Generic-9875933-0  | High Priority Alert: cape_detected_threat",
        "Unix -Yara: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "Unix -IDS Detections: Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config Observed",
        "telejoint.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1490",
          "name": "Inhibit System Recovery",
          "display_name": "T1490 - Inhibit System Recovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1529",
          "name": "System Shutdown/Reboot",
          "display_name": "T1529 - System Shutdown/Reboot"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [
        "Civilian Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1582,
        "FileHash-SHA1": 1096,
        "FileHash-SHA256": 2123,
        "URL": 1283,
        "domain": 857,
        "hostname": 1152,
        "email": 1,
        "CVE": 1,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 8106,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "554 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eb9b88c811f35e060a2aa5",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Crimes of Tracey Richter\"",
      "description": "",
      "modified": "2024-08-14T06:01:01.267000",
      "created": "2024-03-08T23:13:12.950000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65ea64dbc3938c6472fd5e7b",
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 121,
        "FileHash-SHA1": 120,
        "FileHash-SHA256": 1086,
        "URL": 391,
        "domain": 285,
        "hostname": 369,
        "email": 1
      },
      "indicator_count": 2373,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "614 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6694bb9be1b61bf820500004",
      "name": "YouTube Creator Cyber Attacks | Jays Youtube Bot.exe | YT Botnet",
      "description": "YouTube Creator account attacks. Critical alerts, botnets, YT bots. I cannot adequately describe  attack right now.  Retaliation for targets YT channel Song Culture stems from retaliation shortly after a crime against target. Id be interested to learn more. An ITC Intercepter records traffic passed through Song Culture YouTube channel m redirects to other channels. Not reflected in the 1.5 million followers or the 3.2 million views. They just stopped. Then managing director was notified as all of Song Cultures social media Twitter, Instagram, Pinterest succumbed to Emotet attack. Social engineering did occur. Several parties. Alleged eBay , health insurance representatives, an attorney, alleged PI's music managers contacted by phone. A man from Great Britain also began an SE campaign, The strange part is following, confrontations, dangerous attacks, MIB, and other curious in person encounter, critical injuries, financial devastation has caused target to remain isolated.",
      "modified": "2024-08-14T05:03:59.815000",
      "created": "2024-07-15T06:03:07.423000",
      "tags": [
        "historical ssl",
        "referrer",
        "december",
        "sneaky server",
        "replacement",
        "unauthorized",
        "high level",
        "hackers",
        "highly targeted",
        "cyber attack",
        "emotet",
        "critical",
        "copy",
        "united",
        "command decode",
        "suricata ipv4",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "name server",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "song culture",
        "tsara lynn",
        "culture",
        "chime sa",
        "mediawarning",
        "youtube twitter",
        "secchuabitness",
        "secchuamodel",
        "secchuawow64",
        "secchuaplatform",
        "pragma",
        "form",
        "hope",
        "karma",
        "learn",
        "suspicious",
        "flag",
        "pe resource",
        "synaptics",
        "apeaksoft ios",
        "hiddentear",
        "urls",
        "domains",
        "contacted",
        "markmonitor",
        "win32 exe",
        "parents",
        "type name",
        "msrsaapp",
        "youtube bot",
        "rar jays",
        "mozilla firefox",
        "twitch",
        "samplename",
        "rar youtube",
        "zip youtube",
        "social bots",
        "files",
        "file type",
        "kb file",
        "b file",
        "graph",
        "get https",
        "msie",
        "windows nt",
        "win64",
        "slcc2",
        "media center",
        "request",
        "gmt server",
        "referer https",
        "amd64 accept",
        "accept",
        "code",
        "rwx memory",
        "managed code",
        "calls unmanaged",
        "native",
        "often seen",
        "base64 encrypt",
        "trojan",
        "tsara brashears",
        "red team hacking",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "high",
        "medium",
        "objects",
        "regbinary",
        "module load",
        "t1129",
        "t1060",
        "crash",
        "dock",
        "persistence",
        "execution",
        "okhfjrtblzo",
        "ip check",
        "windows",
        "http host",
        "controlservice",
        "domain",
        "registry",
        "tools",
        "service",
        "worm",
        "malware",
        "win32",
        "bits",
        "read c",
        "intel",
        "ms windows",
        "pe32",
        "search",
        "type read",
        "show",
        "wow64",
        "stop",
        "write",
        "unknown",
        "waiting",
        "push",
        "next",
        "asnone united",
        "aaaa",
        "united kingdom",
        "as20738 host",
        "moved",
        "passive dns",
        "default",
        "delete c",
        "pe32 executable",
        "document file",
        "v2 document",
        "floodfix",
        "floxif",
        "name servers",
        "susp",
        "showing",
        "as55286",
        "scan endpoints",
        "all scoreblue",
        "ransom",
        "amadey",
        "songculture",
        "spreader",
        "tracey richter",
        "roberts",
        "michael roberts",
        "jays",
        "sabey",
        "rexxfield",
        "darklivity"
      ],
      "references": [
        "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
        "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
        "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
        "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
        "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
        "Ransom: message.htm.com",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
        "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
        "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
        "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
        "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
        "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
        "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
        "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
        "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
        "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
        "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
        "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
        "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
        "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
        "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
        "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "W32.AIDetectMalware.CS",
          "display_name": "W32.AIDetectMalware.CS",
          "target": null
        },
        {
          "id": "Win.Virus.Pioneer-9111434-0",
          "display_name": "Win.Virus.Pioneer-9111434-0",
          "target": null
        },
        {
          "id": "Virus:Win32/Floxif.H",
          "display_name": "Virus:Win32/Floxif.H",
          "target": "/malware/Virus:Win32/Floxif.H"
        },
        {
          "id": "Win32:Renos-KY\\ [Trj]",
          "display_name": "Win32:Renos-KY\\ [Trj]",
          "target": null
        },
        {
          "id": ",  Win.Worm.Pykspa-6057105-0",
          "display_name": ",  Win.Worm.Pykspa-6057105-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Pykspa.C",
          "display_name": "Worm:Win32/Pykspa.C",
          "target": "/malware/Worm:Win32/Pykspa.C"
        },
        {
          "id": "PUP/Hacktool",
          "display_name": "PUP/Hacktool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 439,
        "FileHash-SHA1": 386,
        "FileHash-SHA256": 2320,
        "URL": 1873,
        "domain": 478,
        "hostname": 839,
        "SSLCertFingerprint": 9,
        "email": 7
      },
      "indicator_count": 6351,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "614 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "666d1488316880c73e04054e",
      "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
      "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
      "modified": "2024-07-15T03:03:34.888000",
      "created": "2024-06-15T04:11:52.737000",
      "tags": [
        "server",
        "hostmaster",
        "amazon legal",
        "dept",
        "amazon",
        "street",
        "stateprovince",
        "postal code",
        "view whois",
        "whois record",
        "date",
        "contact",
        "threat roundup",
        "november",
        "march",
        "december",
        "february",
        "october",
        "january",
        "highly targeted",
        "data",
        "boost mobile",
        "formbook",
        "response final",
        "url https",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "ord52c2 via",
        "cloudfront",
        "sha1",
        "pattern match",
        "ascii text",
        "document file",
        "v2 document",
        "crlf line",
        "size",
        "unicode",
        "beginstring",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "unknown",
        "embeddedwb",
        "windows",
        "search",
        "medium",
        "united",
        "show",
        "whitelisted",
        "shellexecuteexw",
        "msie",
        "tofsee",
        "service",
        "write",
        "win32",
        "malware",
        "copy",
        "a nxdomain",
        "passive dns",
        "domain",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "ip related",
        "process32nextw",
        "components",
        "writeconsolew",
        "copy c",
        "delete c",
        "query",
        "useruin",
        "delphi",
        "capture",
        "install",
        "prorat",
        "url http",
        "http",
        "related nids",
        "files location",
        "regsetvalueexa",
        "hx88x89",
        "regbinary",
        "x95xd3xa4",
        "x8dxb7xb7",
        "hx88x9ax1e",
        "mx81xd1r",
        "x92xac",
        "xc2x84",
        "x93xaf",
        "stream",
        "persistence",
        "execution",
        "creation date",
        "entries",
        "as44273 host",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "accept",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "ipv4",
        "path",
        "pragma",
        "name servers",
        "west domains",
        "hostname",
        "next",
        "asnone germany",
        "as21499 host",
        "singapore",
        "france",
        "object",
        "com cnt",
        "dem fin",
        "found",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "levelblue",
        "open threat",
        "meta",
        "a div",
        "div div",
        "france unknown",
        "ok server",
        "type",
        "seychelles",
        "whitesky",
        "as29182 jsc",
        "showing",
        "as24940 hetzner",
        "moved",
        "expiration date",
        "aaaa",
        "russia",
        "as15169 google",
        "germany",
        "emails",
        "germany unknown",
        "a domains",
        "body doctype",
        "html public",
        "ietfdtd html",
        "finland",
        "asnone iran",
        "iran",
        "td tr",
        "td td",
        "tbody",
        "tr tr",
        "domains",
        "backdoor",
        "apple",
        "radio hacking",
        "voicestram",
        "listening",
        "trojan",
        "twitter",
        "servers",
        "vbs",
        "data center",
        "avg clamav",
        "msdefender sep",
        "vitro mar",
        "Win32:Vitro",
        "target: tsara brashears",
        "target: brashears personal devices",
        "target: whitesky communication network",
        "target: accounting firm devices",
        "targets: intellectual property",
        "redrum",
        "open",
        "tr tbody",
        "rsa ca",
        "apache",
        "as7922 comcast",
        "pulse submit",
        "url analysis",
        "epss",
        "impact",
        "cve cve20178977",
        "exploits",
        "targeted",
        "cve overview",
        "media"
      ],
      "references": [
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "message.htm.com | Ransomware",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Seychelles",
        "Netherlands",
        "France",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win32:BackdoorX-gen\\ [Trj]",
          "display_name": "Win32:BackdoorX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-6840338-0",
          "display_name": "Win.Trojan.Tofsee-6840338-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Dursg.K",
          "display_name": "Trojan:Win32/Dursg.K",
          "target": "/malware/Trojan:Win32/Dursg.K"
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Downloader-42770",
          "display_name": "Win.Trojan.Downloader-42770",
          "target": null
        },
        {
          "id": "TrojanDownloader:JS/Nemucod.QJ",
          "display_name": "TrojanDownloader:JS/Nemucod.QJ",
          "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "Win.Trojan.Magania-13720",
          "display_name": "Win.Trojan.Magania-13720",
          "target": null
        },
        {
          "id": "Win32:Sality",
          "display_name": "Win32:Sality",
          "target": null
        },
        {
          "id": "Win.Trojan.Swisyn-6819",
          "display_name": "Win.Trojan.Swisyn-6819",
          "target": null
        },
        {
          "id": "Win32:SaliCode",
          "display_name": "Win32:SaliCode",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-1313630",
          "display_name": "Win.Trojan.Agent-1313630",
          "target": null
        },
        {
          "id": "Crypt_r.BCM",
          "display_name": "Crypt_r.BCM",
          "target": null
        },
        {
          "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1416",
          "name": "URI Hijacking",
          "display_name": "T1416 - URI Hijacking"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1003.005",
          "name": "Cached Domain Credentials",
          "display_name": "T1003.005 - Cached Domain Credentials"
        },
        {
          "id": "T1212",
          "name": "Exploitation for Credential Access",
          "display_name": "T1212 - Exploitation for Credential Access"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        }
      ],
      "industries": [
        "Retail",
        "Technology",
        "Telecommunications",
        "Civil Society",
        "Online Shopping",
        "Legal"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1965,
        "hostname": 1378,
        "domain": 1922,
        "FileHash-SHA256": 2639,
        "FileHash-MD5": 386,
        "FileHash-SHA1": 377,
        "email": 11,
        "CVE": 2
      },
      "indicator_count": 8680,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "644 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "665a8d410ef48824abde85d1",
      "name": "Ransomware | Modification | Apple Data Collection | Android Modification",
      "description": "This effort seems futile. No matter how much pertinent information gathered in hopes of finding a resolution, there is a fi;e deletion campaign going on. It's affecting VirusTotal and AlienVault. \nSince governments, law firms, cyber security defense hackers and private investigators have access and abuse alt+Google, alt+virustotal and anything else that keeps them looking shiny this is a bit passive as non evident file deletion continues to occur. This is cyber warfare, best left in the hands of experienced professionals Greys & Purples. \nOnly some targeted individuals redirected to alternative, modified version of malware hunting services.",
      "modified": "2024-07-01T02:04:01.564000",
      "created": "2024-06-01T02:53:53.149000",
      "tags": [
        "utc http",
        "response final",
        "url https",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "threat roundup",
        "june",
        "october",
        "historical ssl",
        "july",
        "december",
        "apple ios",
        "mustang panda",
        "plugx",
        "cobatstrike",
        "cryptbot",
        "anubis",
        "hacktool",
        "malicious",
        "file type",
        "google safe",
        "browsing",
        "whois",
        "virustotal api",
        "name verdict",
        "falcon sandbox",
        "reports no",
        "specific",
        "hybrid",
        "analysis",
        "antivirus",
        "pattern match",
        "hybrid analysis",
        "february",
        "sample",
        "external system",
        "network related",
        "strings",
        "contact",
        "united",
        "as15169 google",
        "status",
        "aaaa",
        "search",
        "name servers",
        "as1659 taiwan",
        "passive dns",
        "urls",
        "creation date",
        "date",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "files",
        "unknown",
        "high",
        "yara rule",
        "cape",
        "alerts",
        "checks",
        "steals",
        "internet",
        "links",
        "accountjournal",
        "neljournal",
        "april",
        "vidar",
        "read c",
        "create c",
        "default",
        "medium",
        "count",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "dock",
        "write",
        "execution",
        "next",
        "copy",
        "xport",
        "as62597 nsone",
        "entries",
        "domain",
        "showing",
        "cname",
        "body",
        "as44273 host",
        "record value",
        "nxdomain",
        "content type",
        "accept",
        "hackers"
      ],
      "references": [
        "https://www.google.com/?****client=ms-android-americamovil-us-revc+pccc=?private=false | plugin -hacked android device | Custom mods",
        "message.htm.com | Ransomware | ransomed.vc | message.htm.com | http://www.ransomed.vc | https://www.ransomed.vc",
        "File Score: 10/10 Malicious | Yara Detections: RAR_Archive",
        "Alerts: procmem_yara injection_inter_process injection_create_remote_thread antidebug_windows antisandbox_sleep antivm_generic_bios",
        "Alerts: anomalous_deletefile antidebug_guardpages dead_connect process_creation_suspicious_location infostealer_browser",
        "Alerts: antivm_vbox_keys cape_extracted_content deletes_executed_files infostealer_cookies network_bind",
        "Alerts: ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
        "nr-data.net _[Apple Private Data Collection]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://otx.alienvault.com/indicator/file/fee5e202497ecf3e0f2d829f11afe55c8c7f525cd08bf1d570a96e226bb0bdca",
        "https://otx.alienvault.com/indicator/file/201d64e8b58a429737f525a975d5da7b1c61e4b858baf4f2d2ec047f3d541338"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1560.003",
          "name": "Archive via Custom Method",
          "display_name": "T1560.003 - Archive via Custom Method"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1037.003",
          "name": "Network Logon Script",
          "display_name": "T1037.003 - Network Logon Script"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1175,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1285,
        "URL": 1244,
        "domain": 427,
        "hostname": 398,
        "CVE": 2,
        "FileHash-MD5": 15,
        "FileHash-SHA1": 8,
        "email": 4
      },
      "indicator_count": 3383,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "658 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e843669f4ba77affa4b297",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
      "description": "303 Error redirect target to desired service. | Likely using infected, updated apple Product. | Jays Youtube Bot.exe found. | Target saw episode subject, was suspicious due to 'diabolical women' connection promoted by Rexxfield[.] com (Tracey Richters ex-husband). I believe she was framed as is target I have come across. YouTube accounts are only told from the perspective of 2 ex-husbands, 1 doctor, 1 hacker and dentist[assaulter] who abused power. This trap makes targets look crazy, non credible leaving them traumatized. Attorneys or law enforcement likely  overwhelmed, wild stories. I often consider truth is can be much stranger than fiction. Fiction often loosely based on truth.",
      "modified": "2024-04-05T09:00:01.502000",
      "created": "2024-03-06T10:20:22.440000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 52,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 115,
        "FileHash-SHA1": 114,
        "FileHash-SHA256": 952,
        "URL": 285,
        "domain": 257,
        "hostname": 285,
        "email": 1
      },
      "indicator_count": 2009,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea64dbc3938c6472fd5e7b",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"  Crimes of Tracey Richter",
      "description": "",
      "modified": "2024-04-05T09:00:01.502000",
      "created": "2024-03-08T01:07:39.514000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e843669f4ba77affa4b297",
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 115,
        "FileHash-SHA1": 114,
        "FileHash-SHA256": 952,
        "URL": 285,
        "domain": 257,
        "hostname": 285,
        "email": 1
      },
      "indicator_count": 2009,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "745 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b5c5ebba25ca46fc5b36bc",
      "name": "NSO Group Pegasus spyware found attack a US citizen. Silencing",
      "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\n\u2022NSO Group develops best-in-class technology to help government agencies detect and prevent terrorism and crime.\n\u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. \nNon terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
      "modified": "2024-03-27T00:05:34.925000",
      "created": "2024-01-28T03:11:39.752000",
      "tags": [
        "whois record",
        "ssl certificate",
        "threat roundup",
        "october",
        "august",
        "september",
        "november",
        "april",
        "march",
        "tsara brashears",
        "copy",
        "execution",
        "metro",
        "awful",
        "attack",
        "quasar",
        "malicious",
        "crypto",
        "contact",
        "contacted",
        "pe resource",
        "communicating",
        "pegasus",
        "bundled",
        "historical ssl",
        "cellbrite",
        "core",
        "startpage",
        "ursnif",
        "amadey",
        "probe",
        "targets sa",
        "survivor",
        "referrer",
        "whois whois",
        "whois ssl",
        "apple",
        "status",
        "creation date",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse submit",
        "date",
        "next",
        "et exploit",
        "probe ms17010",
        "smbds ipc",
        "show",
        "service",
        "entries",
        "msf style",
        "generic flags",
        "pe32",
        "exploit",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "eternalblue",
        "playgame",
        "bitcoin",
        "virgin islands",
        "as19905",
        "record value",
        "unknown",
        "body",
        "meta",
        "error",
        "united",
        "as7922 comcast",
        "x ua",
        "ipv4",
        "pulse pulses",
        "files",
        "moved",
        "title",
        "gmt content",
        "cookie",
        "as15169 google",
        "mtb jan",
        "otx telemetry",
        "query",
        "trojan",
        "msr jan",
        "as29580 a1",
        "domain",
        "showing",
        "as8866",
        "cellebrite",
        "aaaa",
        "russia unknown",
        "dnssec",
        "nxdomain",
        "a domains",
        "download",
        "accept",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ios",
        "ireland",
        "servers",
        "msie",
        "chrome",
        "certificate",
        "hostname",
        "url analysis",
        "http response",
        "final url",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers date",
        "connection",
        "date sat",
        "html info",
        "forbidden",
        "google tag",
        "utc aw741566034",
        "utc redirection",
        "asnone united",
        "as54113",
        "cname",
        "script urls",
        "as19527 google",
        "as35280 acorus",
        "encrypt",
        "reverse dns",
        "location dublin",
        "domain name",
        "emails",
        "as23724",
        "as4812 china",
        "china",
        "win32mydoom jan",
        "ransom",
        "worm",
        "as4808 china",
        "browse scan",
        "endpoints all",
        "login",
        "sign up",
        "tulach",
        "c-67-181-73-197.hsd1.ca.comcast.net",
        "social engineering",
        "contact made by mark brian sabey",
        "contact made by o'dea",
        "benjamin c"
      ],
      "references": [
        "enterprise.cellebrite.com [ digitalclues.com]",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "https://tulach.cc/ [malware engineering | phishing]",
        "deviceinbox.com [malware hosting]",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "message.htm.com [ message stealer]",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "https://www.nsogroup.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
        "training001.blackbagtech.com [opportunity?]",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "Germany",
        "Virgin Islands, British"
      ],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Mydoom",
          "display_name": "Backdoor:Win32/Mydoom",
          "target": "/malware/Backdoor:Win32/Mydoom"
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 4655,
        "URL": 9981,
        "FileHash-MD5": 219,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 6722,
        "hostname": 4341,
        "CVE": 2,
        "email": 12,
        "BitcoinAddress": 3
      },
      "indicator_count": 26148,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "754 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "htm.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "htm.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776707182.77137
}