{
  "type": "URL",
  "indicator": "https://a-a.pr-cy.hacklix.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://a-a.pr-cy.hacklix.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2894444694,
      "indicator": "https://a-a.pr-cy.hacklix.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "6590f9011e57040b2717c99c",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:45.262000",
          "created": "2023-12-31T05:15:45.262000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6590f8f3b192d56e80294c13",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "840 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f8f3b192d56e80294c13",
          "name": "Aig.com Pegasus attack+ https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:31.645000",
          "created": "2023-12-31T05:15:31.645000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653f21878bcd05f7d594ff86",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "840 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db044432cdee91e2f5d1c",
          "name": "AIG Hacked or Spoofed website?",
          "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:07:16.410000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db0487ec8c7a4c0b1ef0e",
          "name": "AIG Hacked or Spoofed website?",
          "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:07:20.916000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db12d71978ca34e49e88e",
          "name": "Hacking stemming from malicious DGA Insurance domains under Cisco Umbrella",
          "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:11:09.672000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570",
            "defense entity fraud?"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db32c6a6193714e513695",
          "name": "Targeted hacking via malicious DGA insurance domains AIGcom  | Host: am1mxi05.aig.com | IP: 167.230.100.44",
          "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago\nHard to understand.",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:19:40.692000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f02c459cc8bcaa5ebeb7a",
          "name": "Targeted hacking via malicious DGA insurance domains AIGcom",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T01:11:32.672000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653db32c6a6193714e513695",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f05ff39b2dee54b89d17a",
          "name": "AIG Hacked or Spoofed website?",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T01:25:19.036000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653db0487ec8c7a4c0b1ef0e",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f21878bcd05f7d594ff86",
          "name": " AIG Hacked or Spoofed website?",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T03:22:47.684000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653db044432cdee91e2f5d1c",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "650a0b7c9a6b3c5d0a2a3960",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "Link: apple.instagram.com \nQuasar is a lightweight, publicly available open-source Remote Access Trojan (RAT). Used by a variety of attackers.  Typically packed to make analysis of the source demanding.\nAccount appears to have been breached, operational in dark web. Dead host.",
          "modified": "2023-10-19T14:04:37.381000",
          "created": "2023-09-19T20:58:36.137000",
          "tags": [
            "contacted",
            "threat roundup",
            "execution",
            "ssl certificate",
            "dark web",
            "crypto threat",
            "resolutions",
            "referrer",
            "stealer",
            "quasar",
            "asyncrat",
            "error",
            "social engineering",
            "iPhone phishing",
            "Apple phishing",
            "email phishing",
            "emotet",
            "remote",
            "attacks"
          ],
          "references": [
            "Alienvault OTX",
            "Data Analysis",
            "Online Research",
            "WebTools"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "India"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/AsyncRAT",
              "display_name": "Backdoor:MSIL/AsyncRAT",
              "target": "/malware/Backdoor:MSIL/AsyncRAT"
            },
            {
              "id": "Backdoor:MSIL/QuasarRat",
              "display_name": "Backdoor:MSIL/QuasarRat",
              "target": "/malware/Backdoor:MSIL/QuasarRat"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [
            "Media",
            "Social Media",
            "Technology",
            "Hacking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 5791,
            "URL": 11513,
            "domain": 2317,
            "hostname": 3255,
            "CVE": 3
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "913 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "WebTools",
        "Online Research",
        "Alienvault OTX",
        "Data Analysis"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Azorult",
            "Blacknet",
            "Skynet",
            "Immortal stealer",
            "Goldfinder",
            "Firehol",
            "Gandcrab",
            "Trojanx",
            "Domains",
            "Ducktail",
            "Backdoor:msil/quasarrat",
            "Tofsee",
            "Ransomware",
            "Ransomexx",
            "Hacktool.cheatengine",
            "Webtoolbar",
            "Backdoor:msil/asyncrat",
            "Raccoon stealer",
            "Maltiverse",
            "Hacktool.bruteforce",
            "Mirai",
            "Nanocore",
            "Nymaim",
            "Looquer",
            "Hacktool",
            "Yixun",
            "Mimikatz",
            "Trojanspy",
            "Emotet",
            "Chinese",
            "Goldmax - s0588",
            "Sibot",
            "Trojan:win32/installcore",
            "Neurovt",
            "Inmortal",
            "Artemis",
            "Hiddentear",
            "Opencandy"
          ],
          "industries": [
            "Media",
            "Technology",
            "Hacking",
            "Social media"
          ],
          "unique_indicators": 36090
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/hacklix.com",
    "whois": "http://whois.domaintools.com/hacklix.com",
    "domain": "hacklix.com",
    "hostname": "a-a.pr-cy.hacklix.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "6590f9011e57040b2717c99c",
      "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
      "description": "",
      "modified": "2023-12-31T05:15:45.262000",
      "created": "2023-12-31T05:15:45.262000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6590f8f3b192d56e80294c13",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "840 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6590f8f3b192d56e80294c13",
      "name": "Aig.com Pegasus attack+ https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
      "description": "",
      "modified": "2023-12-31T05:15:31.645000",
      "created": "2023-12-31T05:15:31.645000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653f21878bcd05f7d594ff86",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "840 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a581b1024ea61979da96",
      "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
      "description": "",
      "modified": "2023-12-06T16:46:57.782000",
      "created": "2023-12-06T16:46:57.782000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 5791,
        "hostname": 3255,
        "domain": 2317,
        "FileHash-MD5": 44,
        "FileHash-SHA1": 34,
        "URL": 11513
      },
      "indicator_count": 22957,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653db044432cdee91e2f5d1c",
      "name": "AIG Hacked or Spoofed website?",
      "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-29T01:07:16.410000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653db0487ec8c7a4c0b1ef0e",
      "name": "AIG Hacked or Spoofed website?",
      "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-29T01:07:20.916000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653db12d71978ca34e49e88e",
      "name": "Hacking stemming from malicious DGA Insurance domains under Cisco Umbrella",
      "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-29T01:11:09.672000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570",
        "defense entity fraud?"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653db32c6a6193714e513695",
      "name": "Targeted hacking via malicious DGA insurance domains AIGcom  | Host: am1mxi05.aig.com | IP: 167.230.100.44",
      "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago\nHard to understand.",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-29T01:19:40.692000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 55,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f02c459cc8bcaa5ebeb7a",
      "name": "Targeted hacking via malicious DGA insurance domains AIGcom",
      "description": "",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-30T01:11:32.672000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "653db32c6a6193714e513695",
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f05ff39b2dee54b89d17a",
      "name": "AIG Hacked or Spoofed website?",
      "description": "",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-30T01:25:19.036000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653db0487ec8c7a4c0b1ef0e",
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f21878bcd05f7d594ff86",
      "name": " AIG Hacked or Spoofed website?",
      "description": "",
      "modified": "2023-11-27T23:02:02.229000",
      "created": "2023-10-30T03:22:47.684000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "contacted",
        "execution",
        "august",
        "march",
        "whois record",
        "contacted urls",
        "malware",
        "copy",
        "april",
        "crypto",
        "alive",
        "malicious",
        "ducktail",
        "ransomware",
        "dead",
        "skynet",
        "chinese",
        "october",
        "roundup",
        "february",
        "goldfinder",
        "sibot",
        "hacktool",
        "metro",
        "goldmax",
        "installer",
        "awful",
        "open",
        "android",
        "banker",
        "keylogger",
        "united",
        "maltiverse",
        "mail spammer",
        "phishing site",
        "cyber threat",
        "engineering",
        "emotet",
        "phishing",
        "spammer",
        "firehol",
        "bank",
        "azorult",
        "team",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "installcore",
        "nymaim",
        "suppobox",
        "download",
        "looquer",
        "domains",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "malware site",
        "malicious site",
        "artemis",
        "opencandy",
        "riskware",
        "tofsee",
        "gandcrab",
        "trojanx",
        "trojan",
        "generic",
        "bankerx",
        "service",
        "runescape",
        "facebook",
        "exploit",
        "agent",
        "mimikatz",
        "unsafe",
        "alexa",
        "union",
        "webtoolbar",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist https",
        "dsp1",
        "noname057",
        "tag count",
        "sample",
        "samples",
        "blacklist",
        "tsara brashears",
        "alohatube",
        "trojan",
        "scanning_host",
        "Botnet",
        "malvertizing",
        "abuse",
        "cyber stalking",
        "defacement",
        "adult content",
        "threats",
        "silencing",
        "harassment",
        "target",
        "aig",
        "workers compensation",
        "severe",
        "attack",
        "hacking",
        "yixun tool",
        "spyware",
        "malware",
        "evasion",
        "malicious",
        "private investigator",
        "legal entities",
        "insurance company",
        "remote attack",
        "colorado",
        "tulach",
        "Attack origin: United States",
        "apple",
        "ios",
        "victim",
        "allegations",
        "assault",
        "revenge",
        "retaliation",
        "libel",
        "monitoring",
        "tracking",
        "pegatech",
        "bam.nr-data.net",
        "bam",
        "nr-data.net",
        "matrix",
        "data.net",
        "asp.net",
        "apple private data collection",
        "norad.mil",
        "norad tracker",
        "b.scope",
        "command_and_control",
        "pornhub",
        "alohatube",
        "sweetheart videos",
        "users voice",
        "interfacing",
        "social engineering",
        "BankerX",
        "law enforcement aware, complacent or complicit?",
        "NSA tool Tulach malaware",
        "metro tmobile",
        "AS 10975 (NET-AIG) US",
        "record type",
        "ttl value",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus ou",
        "entrust",
        "oentrust",
        "l1k validity",
        "cus stnew",
        "group",
        "info",
        "domain status",
        "server",
        "date",
        "registrar abuse",
        "new york",
        "postal code",
        "contact phone",
        "registrar url",
        "csc corporate",
        "code",
        "microsoft",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "confed",
        "network",
        "label netaig",
        "registry arin",
        "country us",
        "continent na",
        "whois lookup",
        "no match",
        "google",
        "dns replication",
        "domain",
        "type name",
        "pine street",
        "whois database",
        "email",
        "registrar iana",
        "icann whois",
        "contact",
        "form",
        "tech",
        "iana id",
        "tech email",
        "admin country",
        "CVE-2017-0147",
        "CVE-2018-0802",
        "CVE-2017-17215",
        "CVE-2016-7255",
        "CVE-2017-11882",
        "CVE-2017-8570"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Chinese",
          "display_name": "Chinese",
          "target": null
        },
        {
          "id": "Looquer",
          "display_name": "Looquer",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "Neurovt",
          "display_name": "Neurovt",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanX",
          "display_name": "TrojanX",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "DUCKTAIL",
          "display_name": "DUCKTAIL",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "GandCrab",
          "display_name": "GandCrab",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Raccoon Stealer",
          "display_name": "Raccoon Stealer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "FireHOL",
          "display_name": "FireHOL",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "NanoCore",
          "display_name": "NanoCore",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebToolBar",
          "display_name": "WebToolBar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653db044432cdee91e2f5d1c",
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5239,
        "FileHash-MD5": 929,
        "FileHash-SHA1": 500,
        "FileHash-SHA256": 3566,
        "domain": 1230,
        "hostname": 2051,
        "CVE": 6,
        "email": 5,
        "CIDR": 1
      },
      "indicator_count": 13527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "874 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://a-a.pr-cy.hacklix.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://a-a.pr-cy.hacklix.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776640808.3375862
}