{
  "type": "URL",
  "indicator": "https://91dv.cc",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://91dv.cc",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3752101117,
      "indicator": "https://91dv.cc",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "65b85faa9b8e3e1206d7f25c",
          "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection ",
          "description": "",
          "modified": "2024-06-15T04:39:29.943000",
          "created": "2024-01-30T02:32:10.210000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659719b77c383c73c05208a9",
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3503,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "673 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0d302007152543202bac",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:29:20.375000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 310,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0d2518a7ef9bb17df1b9",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:29:09.832000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0cfda433eb05bde3827b",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:28:29.606000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0cf9b0dac1aa7f9046cf",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:28:25.092000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afcb842689eb776c0737e5",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-23T14:21:56.725000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aab8eb55243c504a2cb4c0",
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aab8eb55243c504a2cb4c0",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-19T18:01:15.365000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b87d2d435bdad9ce80a3",
          "name": "Racoon Stealer ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:47:09.818000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b4296442cc8db50a264f",
          "name": "Maui Ransomware ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:28:41.569000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653977171f690fb9ab978bf3",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "791 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659864357d1d3185efc5c112",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
          "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-05T20:19:01.457000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a4898fa85cad0af83e032d",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus ",
          "description": "",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-15T01:25:35.060000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659864448507cc1752ff6456",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659864448507cc1752ff6456",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
          "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-05T20:19:16.886000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659719b77c383c73c05208a9",
          "name": "Content Reputation | ET | Botnet | Targeting",
          "description": "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-01-04T20:48:55.431000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc13594cf21dbe00b94807",
          "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection",
          "description": "",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-02-01T21:55:37.581000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85faa9b8e3e1206d7f25c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a7e6e042a968005f7a5552",
          "name": "Content Reputation | ET | Botnet | Targeting",
          "description": "",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-01-17T14:40:32.084000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659719b77c383c73c05208a9",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944a8149f2479b2fbc6cd1",
          "name": "Relic",
          "description": "Malicious redirect to BotNet malvertizing of a business affecting both .command YouTube distribution. YouTube encoded logins. Hacker attack, geo tracking, passwords crack, decryption, C2. Retaliation. Found in referenced Twitter link shared  with me.",
          "modified": "2024-02-01T14:01:46.735000",
          "created": "2024-01-02T17:40:17.890000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers nel",
            "maxage5184000",
            "name verdict",
            "falcon sandbox",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "whois whois",
            "historical ssl",
            "contacted",
            "highly targeted",
            "hackers",
            "botnet",
            "apple ios",
            "malicious",
            "hacktool",
            "quasar",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "file",
            "pattern match",
            "path",
            "date",
            "win64",
            "factory",
            "model",
            "comspec",
            "hybrid",
            "general",
            "click",
            "strings",
            "patch",
            "song culture",
            "tulach"
          ],
          "references": [
            "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
            "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
            "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
            "nr-data.net [Apple Private Data Collection]",
            "init.ess.apple.com [backdoor, malicious script, access via media]",
            "https://stackabuse.com/assets/images/apple",
            "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
            "location-icloud.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
            "mailtrack.io [tracking VirusTotal graphs, link trace back]",
            "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
            "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
            "https://pin.it/ [faux Pinterest for TB]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
            "114.114.114.114 [ Tulach Malware IP]",
            "13.107.136.8  [ Tulach Malware IP redirect]",
            "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
            "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
            "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
            "http://114.114.114.114/ipw.ps1",
            "194.245.148.189 [CnC]",
            "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
            "http://109.206.241.129/666bins/666.mpsl",
            "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
            "143.244.50.213 |169.150.249.162  [malware_hosting]",
            "http://watchhers.net/index.php [malware spreader]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "xred.mooo.com [pornhub trojan]",
            "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
            "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
            "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8049,
            "FileHash-MD5": 388,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 7062,
            "domain": 4401,
            "hostname": 2653,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 22769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29a8dbbe8d0bcc16ed1a",
          "name": "iOS Tracking \u2192 imitation imap: imap.kehlenbach.net | C2 | Cybercrime",
          "description": "",
          "modified": "2023-12-09T08:01:01.882000",
          "created": "2023-11-09T18:49:12.887000",
          "tags": [
            "ssl certificate",
            "tsara brashears",
            "apple ios",
            "whois record",
            "virus network",
            "critical risk",
            "tracker",
            "cyberstalking",
            "drive",
            "apple phone",
            "hacktool",
            "installer",
            "brashears",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654cabd6bb3319558bf2cd38",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 97,
            "FileHash-SHA256": 1170,
            "domain": 593,
            "hostname": 1179,
            "URL": 3246
          },
          "indicator_count": 6384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654cabd6bb3319558bf2cd38",
          "name": "iOS Tracking \u2192 imitation imap: imap.kehlenbach.net | C2 | Cybercrime",
          "description": "BotNet campaign, malvertizing, radar tracking, iOS, OS, IP, dns, location tracking, password cracker, faux Pinterest, phishing, malicious domain.\nTargets:\nhttps://pin.it/ (Dangerous IP)\nhttps://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing)\t\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian\n(password cracker)\t\nhttps://www.pornhub.com/video/search?search=tsara+brashears ( Buff Achievement Tracker)\nhttps://www.sweetheartvideo.com/tsara-brashears/   (botnetwork, tracking):\npin.it (TB IP)\nww.google.com.uy. (Brashears IP addresses) \notc.greatcall.com (Botnetwork, tracking call)\n0-129-103-71imap-intranet-pv-175-166.matomo.cloud (location collection, call, message, email)\nhttps://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= (Transactional email collection)\n\napple iOS, imap",
          "modified": "2023-12-09T08:01:01.882000",
          "created": "2023-11-09T09:52:22.834000",
          "tags": [
            "ssl certificate",
            "tsara brashears",
            "apple ios",
            "whois record",
            "virus network",
            "critical risk",
            "tracker",
            "cyberstalking",
            "drive",
            "apple phone",
            "hacktool",
            "installer",
            "brashears",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 97,
            "FileHash-SHA256": 1170,
            "domain": 593,
            "hostname": 1179,
            "URL": 3246
          },
          "indicator_count": 6384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a77022ab8eb59e186099",
          "name": "scan_host",
          "description": "",
          "modified": "2023-12-06T16:55:12.020000",
          "created": "2023-12-06T16:55:12.020000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a72f140326fa725a7583",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:54:07.518000",
          "created": "2023-12-06T16:54:07.518000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a71746cd05b8ffc71d86",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:43.601000",
          "created": "2023-12-06T16:53:43.601000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6f9f0cb95f36a8590b6",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:13.036000",
          "created": "2023-12-06T16:53:13.036000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6e151668215a7eb7ef6",
          "name": "Cyber Criminal Group",
          "description": "",
          "modified": "2023-12-06T16:52:49.885000",
          "created": "2023-12-06T16:52:49.885000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6cfa62bb520508659a6",
          "name": "NewOrder.doc",
          "description": "",
          "modified": "2023-12-06T16:52:31.959000",
          "created": "2023-12-06T16:52:31.959000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3dd6b4fb6460f906d0b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:57.080000",
          "created": "2023-12-06T16:39:57.080000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3cbf5835c0db09df031",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:39.015000",
          "created": "2023-12-06T16:39:39.015000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3ba609912d5c2688fda",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:22.589000",
          "created": "2023-12-06T16:39:22.589000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3aab919327802eaa6c7",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:06.882000",
          "created": "2023-12-06T16:39:06.882000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a39c62ca90307d3ed7a2",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:52.427000",
          "created": "2023-12-06T16:38:52.427000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a38ab6285fde4c69534d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:34.581000",
          "created": "2023-12-06T16:38:34.581000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a378641e02b700e2c60b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:16.858000",
          "created": "2023-12-06T16:38:16.858000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a368b24b94cdd5d344d0",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:00.732000",
          "created": "2023-12-06T16:38:00.732000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3566f101265e303109f",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:42.071000",
          "created": "2023-12-06T16:37:42.071000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a341ad3da7ce846d2d7a",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:21.524000",
          "created": "2023-12-06T16:37:21.524000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a32e67d395236553d739",
          "name": "confer.pw",
          "description": "",
          "modified": "2023-12-06T16:37:02.495000",
          "created": "2023-12-06T16:37:02.495000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a31d3f7a17df14af4915",
          "name": "-_-",
          "description": "",
          "modified": "2023-12-06T16:36:45.040000",
          "created": "2023-12-06T16:36:45.040000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a30b4e663b75369851e3",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:36:27.088000",
          "created": "2023-12-06T16:36:27.088000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2fa9421d107b6ade1bf",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:36:10.480000",
          "created": "2023-12-06T16:36:10.480000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2e7cd51140a2423edf5",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:51.131000",
          "created": "2023-12-06T16:35:51.131000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2d5e7d74f25c209652d",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:33.433000",
          "created": "2023-12-06T16:35:33.433000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2c28401bda338adc15e",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:14.403000",
          "created": "2023-12-06T16:35:14.403000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2ae16a2ac8b0bd23523",
          "name": "Hacker Group. Cyber Criminal Group",
          "description": "",
          "modified": "2023-12-06T16:34:54.869000",
          "created": "2023-12-06T16:34:54.869000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a29c2e97b9fce90093c3",
          "name": "STOP modifying my pulses. Unauthorized Login. ABUSE! Is this tool safe?",
          "description": "",
          "modified": "2023-12-06T16:34:36.087000",
          "created": "2023-12-06T16:34:36.087000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a28ac07b076a6022abbd",
          "name": "NewOrder.doc",
          "description": "",
          "modified": "2023-12-06T16:34:18.117000",
          "created": "2023-12-06T16:34:18.117000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a278b0d22cb077976227",
          "name": "scan_host",
          "description": "",
          "modified": "2023-12-06T16:34:00.462000",
          "created": "2023-12-06T16:34:00.462000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a265501145de92c5d159",
          "name": "Phishing",
          "description": "",
          "modified": "2023-12-06T16:33:41.886000",
          "created": "2023-12-06T16:33:41.886000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2532d2d154345e475c2",
          "name": "Phishing",
          "description": "",
          "modified": "2023-12-06T16:33:23.968000",
          "created": "2023-12-06T16:33:23.968000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
        "http://watchhers.net/index.php [malware spreader]",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "sweetheartvideo.com",
        "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
        "1.116.217.151 [Cobalt Strike]",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "https://pin.it/ [SQLi Dumper]",
        "http://r3.o.lencr.org",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
        "nr-data.net [Apple Private Data Collection]",
        "104.247.75.218 |      [cnc ]",
        "www.governmentattic.org [privilege: malicious malware downloading]",
        "apple-dns.net.   [Apple email collection]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
        "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
        "0-1.duckdns.org [malicious]",
        "mailtrack.io [tracking VirusTotal graphs, link trace back]",
        "aig.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "msftconnecttest.com",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "www.dead-speak.com",
        "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "Targeting",
        "nr-data.net [ Hidden private Apple data collection]",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "143.244.50.213 |169.150.249.162  [malware_hosting]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
        "http://109.206.241.129/666bins/666.mpsl",
        "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "xred.mooo.com [pornhub trojan]",
        "114.114.114.114 - Tulach Malware",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
        "https://www.myminiweb.com/",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "cellebrite.com | enterprise.cellebrite.com",
        "angebot.staude.de",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "tulach.cc [Adversarial Malware Attack Source]",
        "tsarabrashears.com",
        "13.107.136.8  [ Tulach Malware IP redirect]",
        "newrelic.se    [Apple Collection]",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "https://stackabuse.com/assets/images/apple",
        "114.114.114.114 [ Tulach Malware IP]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/",
        "ns3.hallgrandsale.ru",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "http://114.114.114.114/ipw.ps1",
        "194.245.148.189 [CnC]",
        "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
        "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
        "init.ess.apple.com [backdoor, malicious script, access via media]",
        "location-icloud.com",
        "dvd-game-new-releases.info",
        "vtbehaviour.commondatastorage.googleapis.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "http://alohatube.xyz/search/tsara-brashears",
        "deviceinbox.com",
        "103.224.212.34 scanning_host",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "104.200.22.130 Command and Control",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "init-p01st.push.apple.com",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "Certificate Subject CN=brazzerspesonals.com",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "https://pin.it/ [faux Pinterest for TB]",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
        "Trojan:Win32/WannaCry.350",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "https://twitter.com/sheriffspurlock?lang=en",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "CVE-2017-0147",
        "https://tulach.cc/",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO Group - Pegasus"
          ],
          "malware_families": [
            "Mirai",
            "Trojanspy",
            "Cobalt strike",
            "Dnspionage",
            "Crack",
            "Brashears",
            "Twitter malware",
            "Raccoon",
            "Fonepaw",
            "Maui ransomware",
            "Dapato",
            "Trojan:win32/wannacry.350",
            "Tulach",
            "Death bitches",
            "Bit rat",
            "Zbot",
            "Gootloader",
            "Sabey",
            "Webtoolbar",
            "Ransomexx",
            "Emotet",
            "Pwndlocker",
            "Swisyn",
            "Tulach malware",
            "Tsara brashears",
            "Hallgrand",
            "Quasar rat",
            "Amazon aes",
            "Hacktool",
            "Artemis",
            "Apple malware",
            "Facebook ht",
            "Tofsee",
            "Lockbit",
            "Chaos",
            "Azorult",
            "Cve-2017-0147",
            "Daisy coleman",
            "Vidar",
            "Remcos",
            "Trickbot - s0266",
            "Cve jar",
            "Et",
            "Comspec",
            "Lolkek",
            "Fusioncore",
            "Content reputation",
            "Qakbot",
            "Agent tesla - s0331",
            "Trojan:win32/detplock",
            "Networm",
            "Formbook",
            "Dark power",
            "Hallrender",
            "Spaceship",
            "Virus:dos/paris",
            "Relic"
          ],
          "industries": [],
          "unique_indicators": 146625
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/91dv.cc",
    "whois": "http://whois.domaintools.com/91dv.cc",
    "domain": "91dv.cc",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "65b85faa9b8e3e1206d7f25c",
      "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection ",
      "description": "",
      "modified": "2024-06-15T04:39:29.943000",
      "created": "2024-01-30T02:32:10.210000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "whois whois",
        "apple ios",
        "contacted",
        "tsara brashears",
        "whois",
        "resolutions",
        "password",
        "hacktool",
        "crypto",
        "execution",
        "emotet",
        "installer",
        "banker",
        "keylogger",
        "critical",
        "copy",
        "content reputation",
        "et",
        "submission",
        "comodo valkyrie",
        "verdict",
        "bitdefender",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "search",
        "entries",
        "passive dns",
        "urls",
        "record value",
        "unknown",
        "united",
        "gmt content",
        "dynamic report",
        "0 report",
        "date",
        "accept",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "http response",
        "final url",
        "serving ip",
        "address",
        "ipv4",
        "files",
        "location china",
        "asn as45090",
        "dns resolutions",
        "twitter",
        "log id",
        "gmtn",
        "tls web",
        "encrypt",
        "ca issuers",
        "f20b201c",
        "b467295d",
        "b2931e3f",
        "false",
        "as15169 google",
        "domain",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "create c",
        "write c",
        "read c",
        "medium",
        "next",
        "dock",
        "write",
        "persistence",
        "delete c",
        "path",
        "xport",
        "default",
        "years ago",
        "modified",
        "created",
        "email",
        "active created",
        "white",
        "filehash",
        "memcommit",
        "tlsv1",
        "show",
        "win32",
        "malware",
        "get na",
        "systemroot",
        "starizona",
        "lscottsdale",
        "creation date",
        "emails",
        "domain name",
        "showing",
        "pulse submit",
        "amazon",
        "server ca",
        "b535",
        "tulach",
        "hallrender",
        "hallgrand",
        "briansabey",
        "brian sabey",
        "mark",
        "mark brian sabey",
        "mark sabey",
        "cybercrime",
        "cyber stalking",
        "botnet",
        "evader",
        "hacker",
        "targeting"
      ],
      "references": [
        "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
        "dvd-game-new-releases.info",
        "1.116.217.151 [Cobalt Strike]",
        "https://www.myminiweb.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://alohatube.xyz/search/tsara-brashears",
        "vtbehaviour.commondatastorage.googleapis.com",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://tulach.cc/",
        "ns3.hallgrandsale.ru"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "659719b77c383c73c05208a9",
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 13324,
        "FileHash-MD5": 718,
        "FileHash-SHA1": 617,
        "FileHash-SHA256": 5761,
        "domain": 3503,
        "hostname": 4475,
        "CVE": 1,
        "email": 3,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 28413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "673 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0d302007152543202bac",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:29:20.375000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 310,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0d2518a7ef9bb17df1b9",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:29:09.832000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0cfda433eb05bde3827b",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:28:29.606000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0cf9b0dac1aa7f9046cf",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:28:25.092000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65afcb842689eb776c0737e5",
      "name": "Maui Ransomware",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-23T14:21:56.725000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aab8eb55243c504a2cb4c0",
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "791 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aab8eb55243c504a2cb4c0",
      "name": "Maui Ransomware",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-19T18:01:15.365000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65a9b4296442cc8db50a264f",
      "export_count": 44,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "791 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a9b87d2d435bdad9ce80a3",
      "name": "Racoon Stealer ",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-18T23:47:09.818000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65a9b4296442cc8db50a264f",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "791 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a9b4296442cc8db50a264f",
      "name": "Maui Ransomware ",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-18T23:28:41.569000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653977171f690fb9ab978bf3",
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "791 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659864357d1d3185efc5c112",
      "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
      "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
      "modified": "2024-02-04T18:00:29.833000",
      "created": "2024-01-05T20:19:01.457000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "contacted",
        "dropped",
        "historical ssl",
        "communicating",
        "referrer",
        "stolec kradnie",
        "vt graph",
        "first",
        "utc submissions",
        "submitters",
        "amazonaes",
        "amazon02",
        "cloudflarenet",
        "gandi sas",
        "csc corporate",
        "ltd dba",
        "com laude",
        "facebook",
        "paris",
        "twitter",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "url https",
        "samples",
        "bundled",
        "tracking",
        "tsara brashears",
        "malware hunting",
        "hacktool",
        "emotet",
        "copy",
        "brashears",
        "dynadot inc",
        "enom",
        "srsplus",
        "spaceship",
        "CVE-2017-0147",
        "spy cve",
        "pegasus",
        "CVE-2017-0147 also  found in Pegasus",
        "mile high",
        "logos",
        "trademarks",
        "aylo premium",
        "click",
        "record keeping",
        "statement",
        "all rights",
        "reserved",
        "vendo",
        "hostnames",
        "urls https",
        "namecheap inc",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "fastly",
        "mb installer",
        "helper",
        "summary iocs",
        "graph community",
        "urls",
        "urls http",
        "united",
        "unknown",
        "msie",
        "chrome",
        "passive dns",
        "body",
        "date",
        "gmt server",
        "user agent",
        "content type",
        "encrypt",
        "accept",
        "as136800 sun",
        "ipv4",
        "pulse submit",
        "url analysis",
        "files",
        "location hong",
        "kong asn",
        "dns resolutions",
        "dinkle threat",
        "mirai",
        "hallrender",
        "briansabey",
        "brian sabey",
        "mark sabey",
        "uche6vol",
        "uc health medical campus colorado medical campus",
        "abuse"
      ],
      "references": [
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "CVE-2017-0147",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "114.114.114.114 - Tulach Malware",
        "Targeting",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "tsarabrashears.com",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "sweetheartvideo.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "www.dead-speak.com",
        "Certificate Subject CN=brazzerspesonals.com",
        "http://r3.o.lencr.org",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "104.247.75.218 |      [cnc ]",
        "www.governmentattic.org [privilege: malicious malware downloading]",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "SABEY",
          "display_name": "SABEY",
          "target": null
        },
        {
          "id": "TULACH",
          "display_name": "TULACH",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "SPACESHIP",
          "display_name": "SPACESHIP",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Virus:DOS/Paris",
          "display_name": "Virus:DOS/Paris",
          "target": "/malware/Virus:DOS/Paris"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 885,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 5051,
        "URL": 12316,
        "domain": 3944,
        "hostname": 4449,
        "CVE": 2
      },
      "indicator_count": 27152,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://91dv.cc",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://91dv.cc",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631763.9371283
}