{
  "type": "URL",
  "indicator": "https://a.i.next",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://a.i.next",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3166147445,
      "indicator": "https://a.i.next",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69c1bd40f81db45dc044697c",
          "name": "Masterkey Clone By CallmeDoris",
          "description": "",
          "modified": "2026-03-23T22:22:56.940000",
          "created": "2026-03-23T22:22:56.940000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "642db7b656049e54b2f71c20",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "26 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6844240c68255798e08beb3b",
          "name": "Bilety online: Tw\u00f3j kolejowy partner w podr\u00f3\u017cy",
          "description": "Microsoft has created a new version of its XMLHttpRequest, which allows users to access a website, via a browser or browser without the permission of a third party, using the same address.",
          "modified": "2025-07-07T00:01:51.704000",
          "created": "2025-06-07T11:35:40.942000",
          "tags": [
            "sign",
            "google sign",
            "forgot email",
            "criminalip",
            "create account",
            "bilety online",
            "sprzeday biletw",
            "polregio",
            "ssdeep",
            "license",
            "typeerror",
            "regexp",
            "promise",
            "function",
            "version",
            "typeof symbol",
            "copyright",
            "google llc",
            "apache license",
            "date",
            "without",
            "error",
            "blank",
            "trident",
            "generator",
            "class",
            "mountain view",
            "android",
            "submission",
            "california",
            "common name",
            "google inc",
            "unit android",
            "country code",
            "us state",
            "sha1",
            "sha256",
            "imphash",
            "pehash",
            "file type",
            "vhash",
            "authentihash"
          ],
          "references": [
            "http://bilety.polregio.pl",
            "https://bilety.polregio.pl",
            "http://www.salesmanago.pl/static/sm.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1295,
            "hostname": 302,
            "domain": 137,
            "FileHash-SHA256": 996,
            "FileHash-MD5": 38,
            "FileHash-SHA1": 40,
            "IPv4": 1
          },
          "indicator_count": 2809,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "286 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a54a663b348b34b12f97",
          "name": "Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-12-06T16:46:02.873000",
          "created": "2023-12-06T16:46:02.873000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a47560e3f989a5556289",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:29.567000",
          "created": "2023-12-06T16:42:29.567000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a46fe2f276b4a4daa9f7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:23.297000",
          "created": "2023-12-06T16:42:23.297000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a468597b81d280b67f3b",
          "name": "199.59.243.224 Command and Control",
          "description": "",
          "modified": "2023-12-06T16:42:16.587000",
          "created": "2023-12-06T16:42:16.587000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709fad03b8f1cdc6abe334",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "",
          "modified": "2023-12-06T16:22:04.700000",
          "created": "2023-12-06T16:22:04.700000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709929c16e0817dea8f7ff",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-12-06T15:54:17.119000",
          "created": "2023-12-06T15:54:17.119000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 963,
            "domain": 255,
            "hostname": 730,
            "URL": 2400,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50,
            "email": 1
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657099064c0c0aa442282397",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-12-06T15:53:42.077000",
          "created": "2023-12-06T15:53:42.077000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1040,
            "domain": 293,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56,
            "hostname": 809,
            "URL": 2661,
            "email": 1
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657098ff4c59f8ac3f86f613",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "",
          "modified": "2023-12-06T15:53:35.032000",
          "created": "2023-12-06T15:53:35.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1168,
            "hostname": 1366,
            "domain": 412,
            "URL": 3576,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657098f7a0c84c2c55585e87",
          "name": "https://login.blockchain.com/?#%2Fverify-email                                        ->",
          "description": "",
          "modified": "2023-12-06T15:53:27.118000",
          "created": "2023-12-06T15:53:27.118000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 279,
            "FileHash-SHA256": 1027,
            "hostname": 933,
            "URL": 2201,
            "FileHash-MD5": 56,
            "FileHash-SHA1": 51,
            "email": 2
          },
          "indicator_count": 4549,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657098f2c33d291538754bc7",
          "name": "https://login.blockchain.com/?#%2Fverify-email                                        ->",
          "description": "",
          "modified": "2023-12-06T15:53:22.011000",
          "created": "2023-12-06T15:53:22.011000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 279,
            "FileHash-SHA256": 1027,
            "hostname": 933,
            "URL": 2201,
            "FileHash-MD5": 56,
            "FileHash-SHA1": 51,
            "email": 2
          },
          "indicator_count": 4549,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ea5a3214f63e1d6d94f",
          "name": "lumen.me Honeybadger",
          "description": "",
          "modified": "2023-12-06T15:09:25.749000",
          "created": "2023-12-06T15:09:25.749000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 475,
            "hostname": 315,
            "domain": 233,
            "URL": 1133
          },
          "indicator_count": 2156,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708dff34f37412488dda2a",
          "name": "Digital Ocean",
          "description": "",
          "modified": "2023-12-06T15:06:38.991000",
          "created": "2023-12-06T15:06:38.991000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 703,
            "domain": 734,
            "URL": 5116,
            "hostname": 1266,
            "email": 3
          },
          "indicator_count": 7823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cac217e290594a79ecb",
          "name": "188.166.154.118",
          "description": "",
          "modified": "2023-12-06T15:01:00.949000",
          "created": "2023-12-06T15:01:00.949000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 162,
            "hostname": 494,
            "domain": 375,
            "URL": 1404,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2440,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ca99b684204a04e0b36",
          "name": "188.166.154.118",
          "description": "",
          "modified": "2023-12-06T15:00:57.293000",
          "created": "2023-12-06T15:00:57.293000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 162,
            "hostname": 494,
            "domain": 375,
            "URL": 1404,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2440,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ca60be7cea12070cd6e",
          "name": "188.166.154.118",
          "description": "",
          "modified": "2023-12-06T15:00:54.743000",
          "created": "2023-12-06T15:00:54.743000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 162,
            "hostname": 494,
            "domain": 375,
            "URL": 1404,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2440,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c9ab9d83866b134caea",
          "name": "TopInjurySettlements.com",
          "description": "",
          "modified": "2023-12-06T15:00:42.186000",
          "created": "2023-12-06T15:00:42.186000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 300,
            "hostname": 760,
            "domain": 617,
            "URL": 1744,
            "FileHash-SHA1": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 3424,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0f5981b6d81d0fa423",
          "name": "data102 and colohouse. Malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:23.206000",
          "created": "2023-12-06T14:58:23.206000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 458,
            "domain": 557,
            "URL": 2599,
            "hostname": 952
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c01dca4e6c505e4fca0",
          "name": "Hostgator - whitelisted",
          "description": "",
          "modified": "2023-12-06T14:58:09.135000",
          "created": "2023-12-06T14:58:09.135000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 692,
            "hostname": 1339,
            "domain": 1260,
            "URL": 4622,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708beba2ba8bcfb1d10237",
          "name": "hostkey - Industroyer&ReduceRight",
          "description": "",
          "modified": "2023-12-06T14:57:47.430000",
          "created": "2023-12-06T14:57:47.430000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 304,
            "hostname": 563,
            "domain": 407,
            "URL": 1776,
            "FileHash-SHA1": 2
          },
          "indicator_count": 3052,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fe17dfdfe16066d16de",
          "name": "Bexar.org",
          "description": "",
          "modified": "2023-12-06T14:06:25.800000",
          "created": "2023-12-06T14:06:25.800000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1735,
            "hostname": 1833,
            "domain": 1025,
            "URL": 4668,
            "email": 4,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 6,
            "CIDR": 5
          },
          "indicator_count": 9409,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6507d7f6b7377c6661892549",
          "name": " Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-09-18T04:54:14.378000",
          "created": "2023-09-18T04:54:14.378000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "944 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61e6dadf56df268be36",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:42.532000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61b16728d0a29c7b6a7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:39.783000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a5daf00fa294f0454541",
          "name": "199.59.243.224 Command and Control ",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:54:34.352000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d90dda3a7763b24267102d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d90dda3a7763b24267102d",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "Wannacry, Malware, Trojans, evaders, executables, Droppers,Trickbots,malware on discord Artemis, B.Scope adware Artemis, CVE, Apple phishing ,cve-2014-3931\ncve-2005-0068\ncve-2015-1701\ncve-2004-0790\ncve-2008-2938\ncve-2009-1535\ncve-2009-0233\ncve-2014-6345\ncontains-embedded-js\ncontains-elf\ncve-2008-1447\ncve-1999-0016\nnsis\nattachment\nupx\ncve-2016-2569\ncve-2017-0147\ncontains-pe\nbobsoft\nRulesets:\nTrickBot  \nAPT10_Malware_Sample_Gen  \nRuleset:\n(smtp) unknown command\nSURICATA SMTP Mime base64-decoding failed\nSURICATA SMTP Mime encoded line len exceeded\nSURICATA Applayer Detect protocol only one direction\nFile Found over SMTP and stored\nUnique rule identifier:\nPrivate collection.\nMALWARE\nRANSOM \nMALWARE RANSOM\nworm.mydoom/emailworm\ntrojan.wannacry/wannacryptor\ntrojan.heye/msil\nTrojan: LotAccessUI.EXE ( Win32 EXE \nexecutable\nwindows\nwin32\npe\npeexe\nMagic\t\nPE32 \nMITRE ATT&CK Navigator\nExecution\nTA0002\nPrivilege Escalation\nTA0004\nDefense Evasion\nTA0005\nCredential Access\nTA0006\nDiscovery\nTA0007\nCollection\nTA0009",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-08-13T17:07:38.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642fbeba84c7b4cbee43200a",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-05-07T00:00:36.624000",
          "created": "2023-04-07T06:56:58.157000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "august",
            "body",
            "path",
            "close",
            "format",
            "template",
            "suspicious",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "meta",
            "chat",
            "this",
            "small",
            "june",
            "footer",
            "window",
            "legend",
            "hybrid",
            "click",
            "null",
            "april",
            "general",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2400,
            "hostname": 730,
            "domain": 255,
            "FileHash-SHA256": 963,
            "email": 1,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1078 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642db7b656049e54b2f71c20",
          "name": "masterkey.com.ua/download/MKClientSetup.exe - hybrid 100/100",
          "description": "The entire \"Ad\" eco system is compromised via all main channels , ie google, bing, msn etc utilising many top level domains and brands, its truly the biggest suppky chain attack ever known. So enormously thats its unbelievable and I guess many peeps just cant see it because its simply to overwhelming to consider a reality p plus many perhaps cant digest the advanced use of AI and self repairing neural networks along that are designed to work on standard default configs. its not till you step out of the defaults that you start to see nefariousness",
          "modified": "2023-05-05T16:00:23.366000",
          "created": "2023-04-05T18:02:30.403000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1080 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6428649b535c12c6f8d60b0b",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-05-01T15:05:10.466000",
          "created": "2023-04-01T17:06:35.022000",
          "tags": [
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "path",
            "null",
            "entropy",
            "click",
            "template",
            "date",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "quicksearch",
            "this",
            "suspicious",
            "window",
            "legend",
            "hybrid",
            "hosts",
            "next",
            "main",
            "refresh",
            "hello",
            "voice",
            "malicious",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2661,
            "hostname": 809,
            "domain": 293,
            "FileHash-SHA256": 1040,
            "email": 1,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1084 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6425a2f9c155fd53b9922bcd",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "hope peeps are gona learn from 3cx that false positives are in fact often not false",
          "modified": "2023-04-29T13:05:05.409000",
          "created": "2023-03-30T14:55:53.652000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "dropped file",
            "runtime data",
            "chromeua",
            "optout",
            "programfiles",
            "typeof e",
            "localappdata",
            "error",
            "date",
            "generator",
            "path",
            "null",
            "void",
            "win64",
            "twitter",
            "this",
            "critical",
            "desktop",
            "dark",
            "light",
            "meta",
            "roboto",
            "span",
            "class",
            "template",
            "blink",
            "suspicious",
            "facebook",
            "mexico",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
            "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 412,
            "FileHash-SHA256": 1168,
            "URL": 3576,
            "hostname": 1366,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1086 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "641e0e41b1efe6e622d75902",
          "name": "https://login.blockchain.com/?#%2Fverify-email                                        ->",
          "description": "email confirmation link sent for blockchain wallet on iphone",
          "modified": "2023-04-23T19:00:53.967000",
          "created": "2023-03-24T20:55:29.514000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "dropped file",
            "ansi",
            "optout",
            "license",
            "runtime data",
            "drmedgeua",
            "localappdata",
            "edgeua",
            "optin",
            "error",
            "span",
            "template",
            "unknown",
            "class",
            "window",
            "legend",
            "mexico",
            "hybrid",
            "suspicious",
            "general",
            "malicious",
            "close",
            "click",
            "date",
            "hosts",
            "express",
            "strings",
            "format",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/b324856ed3acdd48a6d7583e9ae0f36a110c28e6b1b185c231129dd4f88049af/640f60d8e122e6ac3a0f1d7e",
            "Full URL from email",
            "https://login.blockchain.com/?#%2Fverify-email%2FLIhC1RPA4qIlUzBPvep8xn5FkBPW4XQlsbo7MBIxQcqfNxPUykgf2GINwzEeUKYkJMV6FJbewOlqaND96%2BR7de%2Bja2BIbLW6E6ZF2zbr05wOyVqAHx7gtq6Y4bhqFinCB3PIOH%2BlVxnfVwrzIbISyMnp7mdw%2FQU5LKoGTTnPq4v1W1uPN7iQcBlIhnNQ6QwO%3Fcontext%3DSETTINGS&#039;"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2201,
            "hostname": 933,
            "domain": 279,
            "FileHash-SHA256": 1027,
            "email": 2,
            "FileHash-MD5": 56,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4549,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1092 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "641e0e3da4fbafac633c0124",
          "name": "https://login.blockchain.com/?#%2Fverify-email                                        ->",
          "description": "email confirmation link sent for blockchain wallet on iphone",
          "modified": "2023-04-23T19:00:53.967000",
          "created": "2023-03-24T20:55:25.579000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "dropped file",
            "ansi",
            "optout",
            "license",
            "runtime data",
            "drmedgeua",
            "localappdata",
            "edgeua",
            "optin",
            "error",
            "span",
            "template",
            "unknown",
            "class",
            "window",
            "legend",
            "mexico",
            "hybrid",
            "suspicious",
            "general",
            "malicious",
            "close",
            "click",
            "date",
            "hosts",
            "express",
            "strings",
            "format",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/b324856ed3acdd48a6d7583e9ae0f36a110c28e6b1b185c231129dd4f88049af/640f60d8e122e6ac3a0f1d7e",
            "Full URL from email",
            "https://login.blockchain.com/?#%2Fverify-email%2FLIhC1RPA4qIlUzBPvep8xn5FkBPW4XQlsbo7MBIxQcqfNxPUykgf2GINwzEeUKYkJMV6FJbewOlqaND96%2BR7de%2Bja2BIbLW6E6ZF2zbr05wOyVqAHx7gtq6Y4bhqFinCB3PIOH%2BlVxnfVwrzIbISyMnp7mdw%2FQU5LKoGTTnPq4v1W1uPN7iQcBlIhnNQ6QwO%3Fcontext%3DSETTINGS&#039;"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2201,
            "hostname": 933,
            "domain": 279,
            "FileHash-SHA256": 1027,
            "email": 2,
            "FileHash-MD5": 56,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4549,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1092 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6426dda295502d82e6e6ef7f",
          "name": "v4 - Hybrid scan uploaded  + all suggested ioc's - vendor.3a0e728a.js another gem in edge on twitter.com/i/flow/login source code",
          "description": "WebpackChunk_Twitter-responsive_web is built on a single web address, which will allow users to upload images, tweets and videos to be stored in the same place as the hashtag.",
          "modified": "2023-03-31T13:18:26.733000",
          "created": "2023-03-31T13:18:26.733000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "memoryfile scan",
            "error",
            "runtime data",
            "typeof e",
            "regexp",
            "array",
            "object",
            "typeof t",
            "void",
            "null",
            "unknown",
            "path",
            "facebook",
            "4096",
            "suspicious",
            "meta",
            "lazy",
            "entity",
            "union",
            "body",
            "idkey",
            "scroll",
            "backspace",
            "insert",
            "roboto",
            "target",
            "stack",
            "hybrid",
            "model",
            "click",
            "stream",
            "strings",
            "qakbot",
            "pattern match",
            "ud801",
            "ud804",
            "ud805",
            "ud806",
            "ud81a",
            "ud835",
            "ud800",
            "ud802",
            "sha1",
            "sha256",
            "vendor.3a0e728a.js"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 222,
            "domain": 221,
            "FileHash-SHA256": 85,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1115 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed86228ecb2b03d35b046f",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:25:54.305000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed8628367c1a4f3f8e773a",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:26:00.959000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628e790d414886e18b33c262",
          "name": "either emotet or a part of it",
          "description": "var a.tldDomains, AWIN.Tracking.com, has a new name for its basket, but how do you find it in your browser?.. and what does this mean?",
          "modified": "2022-06-24T00:01:00.706000",
          "created": "2022-05-25T18:44:29.280000",
          "tags": [
            "tfunction",
            "cnullvvoid",
            "wnullgvoid",
            "bnullhvoid",
            "gnullcvoid",
            "guidewrapper",
            "blog",
            "lfunction",
            "hotjar",
            "iab2",
            "code",
            "number",
            "party",
            "n strictly",
            "life spann",
            "azuren n",
            "cookie tracking",
            "tablen n",
            "n cookies",
            "cookie",
            "null",
            "date",
            "error",
            "ffffff",
            "typeof t",
            "uint16array",
            "regexp",
            "uint8array",
            "array",
            "uint32array",
            "helvetica",
            "void",
            "execution",
            "body",
            "roboto",
            "prop",
            "object",
            "param",
            "cookies",
            "getcookie",
            "name",
            "typeof",
            "uri component",
            "obj2",
            "typeof e",
            "webkit",
            "component",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "function",
            "typeof n",
            "typeof window",
            "uuidv4",
            "ajsanonymousid",
            "suffix",
            "bill",
            "viewed",
            "pavel krayzel",
            "psd2",
            "bt prorata",
            "amex",
            "squad",
            "march",
            "new visitors",
            "promise",
            "nthis",
            "eventprocessor",
            "typeof define",
            "info",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "window",
            "value",
            "customevent",
            "image",
            "samesitelax",
            "invalid pixel",
            "snap",
            "afaf09",
            "sfunction",
            "cfunction",
            "post",
            "appcuesdeps",
            "typeerror",
            "hki3",
            "ogr1",
            "typeof self",
            "full selector",
            "heatmaps",
            "sans",
            "version",
            "releaseid",
            "appcues",
            "dashboard2",
            "dashboard3",
            "technology",
            "selector",
            "click",
            "next",
            "import",
            "generic",
            "started",
            "dismissed",
            "completed",
            "contextual help",
            "symbol",
            "appcuesfunction",
            "widget",
            "iframe",
            "pnull",
            "html",
            "style",
            "ctnull",
            "fanull",
            "license",
            "ynull",
            "config",
            "meta",
            "accept",
            "contabo gmbh",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "safari",
            "firefox",
            "chrome",
            "remove",
            "edge",
            "correct",
            "section",
            "segoe ui",
            "emoji",
            "opera",
            "path",
            "span",
            "this",
            "typeof document",
            "small",
            "blank",
            "pass",
            "core",
            "footer",
            "close",
            "form",
            "main",
            "direct",
            "reduceright",
            "string",
            "f420",
            "gyfpnzbgtf3",
            "copyright",
            "json",
            "sesprops",
            "href",
            "input",
            "class",
            "logger",
            "target",
            "push",
            "awalt",
            "awinawin",
            "explorer",
            "awatp",
            "ccampid",
            "impid",
            "tag1"
          ],
          "references": [
            "https://www.dwin1.com/13976.js",
            "https://cdn.heapanalytics.com/js/heap-3501642718.js",
            "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
            "https://contabo.com/client/client.a529db28.js",
            "https://contabo.com/client/client-30e55c50.css",
            "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
            "https://l.clarity.ms/s/0.6.34/clarity.js",
            "https://www.clarity.ms/tag/uet/5739677",
            "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
            "https://fast.appcues.com/79878.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
            "https://sc-static.net/scevent.min.js",
            "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
            "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
            "https://www.hotjar.com/ensureSegmentId.js",
            "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
            "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
            "https://www.hotjar.com/persistUtmParams.js",
            "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
            "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
            "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 349,
            "hostname": 456,
            "URL": 1730,
            "FileHash-SHA256": 342,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1395 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628af7e3df399fbe9095245f",
          "name": "lumen.me Honeybadger",
          "description": "window.ju_sha256, a new type of code, is written by the same characters:var l,b,c,g,p,a,h,d, c.",
          "modified": "2022-06-21T00:01:09.886000",
          "created": "2022-05-23T02:56:35.154000",
          "tags": [
            "reduceright",
            "lj",
            "number",
            "query",
            "string",
            "trackevent",
            "date",
            "u003e div",
            "simulator",
            "error",
            "regexp",
            "pageview",
            "path",
            "void",
            "code",
            "l420",
            "g5vs2ll0p80",
            "copyright",
            "json",
            "uint8array",
            "ssnull",
            "script",
            "closure library",
            "xdfunction",
            "adfunction",
            "typeof t",
            "typeof symbol",
            "typeof",
            "window",
            "value",
            "function",
            "customevent",
            "image",
            "null",
            "sbfu",
            "typeof n",
            "object",
            "array",
            "control",
            "other",
            "android",
            "x3e div",
            "gtmnwh4dh2",
            "host",
            "page title",
            "page path",
            "typeerror",
            "promise",
            "typeof e",
            "typeof window",
            "aggregateerror",
            "math",
            "target",
            "rangeerror",
            "buffer",
            "index",
            "attempt",
            "argument",
            "google",
            "link",
            "ad tech",
            "providers",
            "ffffff",
            "ip address",
            "combine",
            "accept",
            "save",
            "explorer",
            "cookie",
            "back",
            "iframe",
            "blank",
            "position",
            "juorderid",
            "justuno",
            "body",
            "juorigtop",
            "event",
            "follow",
            "post",
            "config",
            "click",
            "local",
            "fast",
            "comp",
            "form",
            "unknown",
            "push",
            "trcimpl",
            "trcwarn"
          ],
          "references": [
            "https://cdn.taboola.com/scripts/cds-pips.js",
            "https://www.iubenda.com/cookie-solution/confs/js/53119375.js",
            "https://cdn.jst.ai/mwgt_4.1.js?v=5.28",
            "https://cdn.iubenda.com/cookie_solution/iubenda_cs/1.38.0/core-en.js",
            "https://s.pinimg.com/ct/lib/main.32155010.js",
            "https://analytics.tiktok.com/i18n/pixel/config.js?sdkid=C3I4VUA8DUF9JOO44QC0&hostname=lumen.me",
            "https://js.pvd.to/c/v1/pixel-1sdz.js?t=1653350400000",
            "https://cdn.jst.ai/vck.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NWH4DH2",
            "https://analytics.tiktok.com/i18n/pixel/events.js?sdkid=C3I4VUA8DUF9JOO44QC0&lib=ttq",
            "https://cdn.taboola.com/libtrc/unip/1262365/tfa.js",
            "https://s.pinimg.com/ct/core.js",
            "https://www.googleoptimize.com/optimize.js?id=OPT-TQC6JW4",
            "https://www.googletagmanager.com/gtag/js?id=G-5VS2LL0P80&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PF3JNK2&gtm_auth=a6AgvzJ0SAOcyjADNwrdlQ&gtm_preview=env-1&gtm_cookies_win=x"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lj",
              "display_name": "Lj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1134,
            "hostname": 315,
            "domain": 233,
            "FileHash-SHA256": 475
          },
          "indicator_count": 2157,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "1398 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "627fe16ae54614d3d59de881",
          "name": "Digital Ocean",
          "description": "\u2026",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T17:05:46.360000",
          "tags": [
            "min",
            "qe",
            "photostatus",
            "hero stripe",
            "object",
            "boolean",
            "license",
            "urlsearchparams",
            "typeof t",
            "events",
            "pattrick hper",
            "bsd3clause",
            "typeerror",
            "react",
            "date",
            "error",
            "this",
            "flex",
            "open",
            "facebook",
            "close",
            "february",
            "april",
            "june",
            "august",
            "dead",
            "frozen",
            "blank",
            "null",
            "mutation",
            "roboto",
            "4096",
            "unknown",
            "clock",
            "period",
            "footer",
            "android",
            "service",
            "invisible",
            "sphinx",
            "checkbox",
            "click",
            "typeof e",
            "referenceerror",
            "typeof symbol",
            "router",
            "function",
            "intl",
            "push",
            "body",
            "meta",
            "string",
            "url path",
            "url object",
            "full",
            "url api",
            "nativeurl",
            "searchparams",
            "copyright",
            "closure library",
            "includes code",
            "regexp",
            "html",
            "plugindetect",
            "jeff mott",
            "quicktime",
            "flash shockwave",
            "vlc adobereader",
            "span",
            "or conditions",
            "post",
            "array",
            "apache license",
            "version",
            "this code",
            "is provided",
            "on an",
            "ud83d",
            "ud83e",
            "u2695u2696u2708",
            "udc66udc67",
            "udc68udc69",
            "ud83c",
            "dfunction",
            "typeof u",
            "u2640u2642",
            "9000",
            "typeof r",
            "weakmap",
            "asyncfunction",
            "proxy",
            "customevent",
            "uint8array",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "window",
            "documentcookie",
            "typeof self",
            "blob",
            "promise",
            "reduceright",
            "number",
            "l420",
            "gnp82xmkw0p",
            "json",
            "void",
            "public",
            "github",
            "meetup",
            "swarm",
            "jump",
            "sign",
            "releases",
            "packages",
            "contributors",
            "topics",
            "star",
            "contact",
            "code",
            "stars"
          ],
          "references": [
            "xfe-URL-Meetup.com_pro_digitalocean_-stix2-2.1-export.json",
            "https://github.com/meetup/swarm-ui",
            "https://www.googletagmanager.com/gtag/js?id=G-NP82XMKW0P&l=dataLayer&cx=c",
            "https://www.meetup.com/proxydirectory/tags/239562121304/tag.js",
            "https://www.meetup.com/pro_static/en-US/0.f2cf4c3f.js",
            "https://dna8twue3dlxq.cloudfront.net/js/profitwell.js",
            "https://cdn.sift.com/s.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/922061185/?random=1652546907471&cv=9&fst=1652546907471&num=1&label=BaPJCIf2_WYQgZPWtwM&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg5b0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.meetup.com%2FDigitalOceanMoscow%2F&ref=https%3A%2F%2Fwww.meetup.com%2Fpro%2Fdigitalocean%2F&tiba=DigitalOcean%20Moscow%20(Moscow%2C%20Russia)%20%7C%20Meetup&hn=www.googleadser",
            "https://cdn.polyfill.io/v2/polyfill.min.js?features=default-3.6,fetch,Intl,Intl.~locale.en-US,Array.prototype.find,Array.prototype.includes,Object.values&flags=gated",
            "https://www.meetup.com/mu_static/react.ddd38c26.js",
            "https://www.meetup.com/mu_static/en-US/app.0ff22766.js",
            "xfe-URL-Sift.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "MIN",
              "display_name": "MIN",
              "target": null
            },
            {
              "id": "PhotoStatus",
              "display_name": "PhotoStatus",
              "target": null
            },
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "Hero Stripe",
              "display_name": "Hero Stripe",
              "target": null
            },
            {
              "id": "DocumentCookie",
              "display_name": "DocumentCookie",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1266,
            "URL": 5116,
            "domain": 734,
            "FileHash-SHA256": 703,
            "CVE": 1,
            "email": 3
          },
          "indicator_count": 7823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 72,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62756a0d14664003affb0555",
          "name": "hush.com 301 to hushmail.com",
          "description": "var b[f, gw.b, \"dust\" - a.g - has been added to an Array by the end of the year, if there is any chance of it being added.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T18:33:49.161000",
          "tags": [
            "widget",
            "null",
            "regexp",
            "array",
            "copyright",
            "license",
            "calltrkswap",
            "date",
            "typeof s",
            "xmlhttprequest",
            "typeof r",
            "script",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "error",
            "quota",
            "aafunction",
            "dafunction",
            "function",
            "typeof o",
            "reduceright",
            "aw1070742489",
            "uint8array",
            "void",
            "code",
            "typeof symbol",
            "wickedclientid",
            "wickedemail",
            "wickedurl",
            "wickednullurl",
            "typeof e",
            "direct",
            "typeof require",
            "modulenotfound",
            "mini",
            "cnull",
            "anull",
            "nl50",
            "pnull",
            "okcancel",
            "compiled",
            "true",
            "android",
            "trident",
            "form",
            "window",
            "false",
            "acronym",
            "body",
            "canvas",
            "embed",
            "footer",
            "iframe",
            "keygen",
            "legend",
            "mark",
            "meta",
            "ruby",
            "small",
            "span",
            "template",
            "blank",
            "twitter",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "width",
            "object",
            "this",
            "accept",
            "fnumber",
            "gtmmf25krh",
            "host",
            "path"
          ],
          "references": [
            "xfe-URL-Hush.com-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtag/js?id=AW-1070742489&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-MF25KRH",
            "https://www.hushmail.com/shared/javascript/jquery-3.5.1.min.js",
            "https://www.hushmail.com/javascriptinclude/eNrLKC3OyE3MzIkvT00qzixJtSpITE_V98lPz8xzyy_K1csqtjI0MzK2MDcwsbS0ysCq2qkov7w4tSi4JLGkGFUDAF_tIM0,.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
            "https://www.hushmail.com/javascriptinclude/eNpNzEEOQDAQQNEbtVoM7Sks7GXopB0pkQ5xfWJl-5P3JWGh4AvukSRzoKKtqlWlf0Wt4k3rnG2g641Pl6QNOU83zcIn-QMj6ZHpHQ2FF97jiHOmj0ED4FxfwQOf9yPU.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
            "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
            "https://widget.wickedreports.com/widget.js",
            "https://www.googletagmanager.com/gtag/js?id=AW-1070742489",
            "https://www.hushmail.com/status/",
            "https://script.tapfiliate.com/tapfiliate.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-1837381-13",
            "https://widget.wickedreports.com/v2/3469/wr-dafa9fae816c2f65d24d1eb593b58626.js",
            "https://cdn.callrail.com/companies/431115301/7c8f964bc12313c75ad2/12/swap.js",
            "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861725881&ids%5B%5D=431115301",
            "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861793229&ids%5B%5D=431115301",
            "https://widget.trustpilot.com/trustboxes/5406e65db0d04a09e042d5fc/index.html?templateId=5406e65db0d04a09e042d5fc&businessunitId=4bdc496b000064000505a89d#locale=en-US&styleHeight=28px&styleWidth=100%25&theme=light"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "OkCancel",
              "display_name": "OkCancel",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1531",
              "name": "Account Access Removal",
              "display_name": "T1531 - Account Access Removal"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1917,
            "hostname": 698,
            "FileHash-SHA256": 116,
            "domain": 263
          },
          "indicator_count": 2994,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62751d6e20ce7971fe122760",
          "name": "layerhost.com",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T13:06:54.626000",
          "tags": [
            "typeerror",
            "function",
            "string",
            "urlsearchparams",
            "array",
            "object",
            "typeof t",
            "incorrect",
            "boolean",
            "iterator",
            "target",
            "error",
            "typeof o",
            "date",
            "typeof symbol",
            "window",
            "promise",
            "iere",
            "typeof ne",
            "null",
            "body",
            "this",
            "regexp",
            "please",
            "blob",
            "matomo",
            "post",
            "javascript",
            "link",
            "license",
            "info",
            "campaigns",
            "storagetest",
            "typeof json",
            "sufeffxa0",
            "typeof c",
            "document",
            "invalid attempt",
            "chat",
            "search",
            "language",
            "feel",
            "file",
            "call",
            "strongstart",
            "address",
            "again",
            "attrs",
            "cparseint",
            "dparseint",
            "bparseint",
            "9999px",
            "fparseint",
            "eparseint",
            "bnull",
            "gparseint",
            "iparseint",
            "blank",
            "trident",
            "fixedpos",
            "fixedheader",
            "click",
            "rotate",
            "dataslider",
            "eventtarget",
            "basicstructure",
            "moztransition",
            "gthis",
            "preventdefault",
            "bthis",
            "regexcss",
            "xthis",
            "true",
            "filterizr api",
            "filterizr",
            "value",
            "ease",
            "steps",
            "idle",
            "classcallcheck",
            "reveal",
            "init",
            "drilldown",
            "dropdown",
            "dropdownmenu",
            "orbit",
            "slider",
            "burn",
            "sticky",
            "keyboard",
            "eventkey",
            "apple cmd",
            "mapping",
            "mouse",
            "input",
            "cache",
            "button",
            "checkbox",
            "shift",
            "typeof b",
            "pseudo",
            "child",
            "class",
            "attr",
            "void",
            "secure",
            "result"
          ],
          "references": [
            "xfe-IP-134.73.11.118-stix2-2.1-export.json",
            "xfe-URL-Powr.io-stix2-2.1-export 2.json",
            "xfe-URL-Layerhost.com-stix2-2.1-export.json",
            "xfe-URL-https___www.gandi.net-stix2-2.1-export.json",
            "https://www.powr.io/powr.js?platform=html",
            "https://www.layerhost.com/assets/js/vendor/jquery.min.js",
            "https://www.layerhost.com/assets/js/vendor/what-input.js",
            "https://www.layerhost.com/assets/js/vendor/foundation.min.js",
            "https://www.layerhost.com/assets/js/jquery.filterizr.min.js",
            "https://www.layerhost.com/assets/js/yui.js",
            "https://www.layerhost.com/assets/js/app.js",
            "https://www.layerhost.com/assets/js/slider.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://tag.aticdn.net/616708/smarttag.js",
            "https://analytics.gandi.net/piwik.js",
            "https://www.gandi.net/static/js/modern.27ee934b0dc5.js",
            "https://www.gandi.net/static/js/legacy.7cc648e3ff7a.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "EventTarget",
              "display_name": "EventTarget",
              "target": null
            },
            {
              "id": "Filterizr API",
              "display_name": "Filterizr API",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 350,
            "URL": 2035,
            "hostname": 718,
            "FileHash-SHA256": 355,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62680e37bad2501c255b86e3",
          "name": "188.166.154.118",
          "description": "function E(e,t,n), a new type of function, has its own set of functions, which can be used to start or end a specific function for any user or event.",
          "modified": "2022-05-26T00:02:33.465000",
          "created": "2022-04-26T15:22:31.759000",
          "tags": [
            "error",
            "cancel",
            "confirm",
            "function",
            "regexp",
            "width",
            "click",
            "date",
            "typeof b",
            "height",
            "null",
            "this",
            "scroll",
            "body",
            "class",
            "target",
            "service",
            "accept",
            "twitter",
            "batal",
            "reload",
            "hj",
            "copyright",
            "closure library",
            "object",
            "hotjar",
            "email",
            "typeof symbol",
            "typeof e",
            "telefon",
            "array",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "send",
            "minified",
            "original file",
            "catched",
            "typeof y",
            "typeof blob",
            "blob",
            "xmlhttprequest",
            "tracking file",
            "mktz",
            "varname",
            "typeradio",
            "getnow",
            "visitor",
            "explorer",
            "android",
            "unknown",
            "x3e3",
            "gfunction",
            "jfunction",
            "yfunction",
            "typeof r",
            "f3e3",
            "string",
            "typeof t",
            "function code",
            "angular",
            "angularjs",
            "ember",
            "meteor",
            "zepto",
            "jquery",
            "reduceright",
            "trackevent",
            "page",
            "number",
            "digitalocean",
            "linode",
            "home cta",
            "vultr",
            "home page",
            "demo",
            "path",
            "magento",
            "derek",
            "void",
            "code",
            "typeof l",
            "json",
            "8760",
            "image",
            "adveid",
            "typeof c",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "addtocart",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtolist",
            "contact",
            "download",
            "install",
            "typeerror",
            "quora pixel",
            "dwelltime",
            "gnu general",
            "public license",
            "sufeffxa0",
            "infinity",
            "gettitle",
            "promise",
            "hidden",
            "oref",
            "activexobject",
            "begin doc",
            "false",
            "cookiesfunction",
            "saconv",
            "pnull",
            "html",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config",
            "iframe",
            "webkittransform",
            "main",
            "maincontent",
            "placeroot",
            "generator",
            "next",
            "info"
          ],
          "references": [
            "xfe-URL-Cloudways.com-stix2-2.1-export.json",
            "https://s.adroll.com/onsite_personalization/production/0.1/static/js/main.39c29e42.js",
            "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
            "https://tags.srv.stackadapt.com/events.js",
            "https://a.quora.com/qevents.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://bat.bing.com/bat.js",
            "https://s.adroll.com/j/roundtrip.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NWBZTT",
            "https://bam-cell.nr-data.net/1/f825f6c9b9?a=1271427646&v=1215.1253ab8&to=NVNUNkBQDxADV0RQXgwZYxBbHggNBlFIF0EKRg%3D%3D&rst=3260&ck=1&ref=https://www.cloudways.com/en/&ap=335&be=1077&fe=2760&dc=1572&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1650985479670,%22n%22:0,%22f%22:498,%22dn%22:499,%22dne%22:551,%22c%22:552,%22s%22:748,%22ce%22:841,%22rq%22:841,%22rp%22:1047,%22rpe%22:1047,%22dl%22:1066,%22di%22:1561,%22ds%22:1573,%22de%22:1599,%22dc%22:2759,%22l%22:2760,%22le%22:2765%7D,%22navigation%22:",
            "https://js-agent.newrelic.com/nr-spa-1215.min.js",
            "https://serve.albacross.com/track.js",
            "https://cdn.omniconvert.com/js/a91f81f.js",
            "https://tracking.g2crowd.com/attribution_tracking/conversions/3769.js?p=https://www.cloudways.com/en/&e=",
            "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/948053426/?random=1650985487354&cv=9&fst=1650985487354&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4p0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.cloudways.com%2Fen%2F&tiba=Cloudways%3A%20Managed%20Cloud%20Hosting%20Platform%20Simplified%20-%20Cloudways&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://s.adroll.com/j/exp/UZQYN577R5CHXAGR45AYXQ/index.js",
            "https://s.adroll.com/j/pre/UZQYN577R5CHXAGR45AYXQ/3YIA4GQCONCAVH77AJMDGR/fpconsent.js",
            "https://www.cloudways.com/wp-content/cache/breeze-minification/js/breeze_44ba8066e751ddb3b497212de30fa3f9.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 494,
            "URL": 1404,
            "domain": 375,
            "FileHash-SHA256": 162,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2440,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6267f71bb359ab220c1f1ebc",
          "name": "TopInjurySettlements.com",
          "description": "The link received via sms is http://ltee9r.com/8b94d111db",
          "modified": "2022-05-26T00:02:33.465000",
          "created": "2022-04-26T13:43:55.682000",
          "tags": [
            "label",
            "segoe ui",
            "emoji",
            "copyright",
            "tbody",
            "bootstrap",
            "twitter",
            "applesystem",
            "roboto",
            "helvetica neue",
            "error",
            "insert",
            "yfunction y",
            "reduceright",
            "vd",
            "number",
            "string",
            "regexp",
            "r420",
            "grfd5csnkhh",
            "json",
            "uint8array",
            "date",
            "void",
            "pushnami",
            "traditional",
            "array",
            "null",
            "typeerror",
            "math",
            "opts",
            "object",
            "click",
            "scroll",
            "window",
            "service",
            "lion",
            "catalina",
            "donut",
            "lollipop",
            "android",
            "nova",
            "galaxy",
            "epsilon",
            "4096",
            "false",
            "path",
            "target",
            "sweet",
            "unknown",
            "legacy",
            "baskerville",
            "typesearch",
            "opentype",
            "montserrat",
            "oswald",
            "lato",
            "typecheckbox",
            "typeradio",
            "typenumber",
            "truetype",
            "class",
            "iframe",
            "woff2",
            "fontface",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "ua720a7ff",
            "typeof symbol",
            "webflow",
            "typeof t",
            "typeof e",
            "function",
            "customevent",
            "typeof self",
            "chrome",
            "body",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "leadid",
            "api module",
            "realplayer",
            "json module",
            "af09",
            "form",
            "colors",
            "flash",
            "sogou",
            "monitoring",
            "zumbot",
            "madbot",
            "isnumeric",
            "typeof n",
            "12863",
            "128r",
            "typesubmit",
            "input",
            "pageview",
            "marketerid",
            "gtmndhw4cn",
            "code",
            "hernia mesh",
            "clergy abuse",
            "roundup talcum",
            "consumer",
            "policy",
            "home",
            "home cases",
            "zantac current",
            "earplugs baby",
            "formula cpap",
            "mission",
            "hold",
            "stop",
            "contact",
            "nicu",
            "paid attorney",
            "advertisement",
            "website",
            "national injury",
            "bureautm",
            "please consult",
            "unsubscribe",
            "ccpa requests"
          ],
          "references": [
            "https://t.fastrk1.com/aff_c?offer_id=5352&aff_id=2509&aff_sub2=1539749374813152417",
            "https://consumer-coalition.com/torts/claims.html?transaction_id=0c847626525f4bab9298573f8d509d13&affiliate_id=271198&source_id=&offer_id=8878&sub1=&sub2=1539749949624560101&sub3=",
            "https://clicks4yourserver.com/?flux_fts=tltplpzitzooaoxclaiettlpqtopzqctlizxiao68b98&list=425sml1",
            "https://www.topinjurysettlements.com/?aff_id=2509&aff_click_id=102dff654f2bfef456dd1d2ac74c17&aff_sub=&aff_sub2=1539750692232271598&aff_sub3=&aff_sub4=&aff_sub5=&source=TIS-OW-5352",
            "https://consumer-coalition.com",
            "xfe-URL-consumer-coalition.com-stix2-2.1-export.json",
            "xfe-URL-t.fastrk1.com-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NDHW4CN",
            "https://cdn.trustedform.com/trustedform-1.8.25.js",
            "https://media.go2app.org/assets/js/dl.js",
            "https://create.lidstatic.com/campaign/0f1079a9-9aa6-a5eb-2774-38847e374a61.js?snippet_version=2",
            "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5fe451bbdf197e0597585200",
            "https://assets.website-files.com/5fe451bbdf197e0597585200/js/top-injury-settlements.8fa01e338.js",
            "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CPT+Sans:400,400italic,700,700italic%7COswald:200,300,400,500,600,700%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CVarela:400%7CLibre+Baskerville:regular,italic,700",
            "https://assets.website-files.com/5fe451bbdf197e0597585200/css/top-injury-settlements.c4dd05676.min.css",
            "https://api.pushnami.com/scripts/v1/pushnami-adv/5f91e677e47f06001001bb94",
            "https://www.googletagmanager.com/gtag/js?id=G-RFD5CSNKHH"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "NICU",
              "display_name": "NICU",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [
            "Legal"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 760,
            "URL": 1744,
            "FileHash-SHA256": 300,
            "domain": 617,
            "FileHash-SHA1": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 3424,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62680e32b8ee0032f3ab4c38",
          "name": "188.166.154.118",
          "description": "function E(e,t,n), a new type of function, has its own set of functions, which can be used to start or end a specific function for any user or event.",
          "modified": "2022-05-26T00:02:33.465000",
          "created": "2022-04-26T15:22:26.556000",
          "tags": [
            "error",
            "cancel",
            "confirm",
            "function",
            "regexp",
            "width",
            "click",
            "date",
            "typeof b",
            "height",
            "null",
            "this",
            "scroll",
            "body",
            "class",
            "target",
            "service",
            "accept",
            "twitter",
            "batal",
            "reload",
            "hj",
            "copyright",
            "closure library",
            "object",
            "hotjar",
            "email",
            "typeof symbol",
            "typeof e",
            "telefon",
            "array",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "send",
            "minified",
            "original file",
            "catched",
            "typeof y",
            "typeof blob",
            "blob",
            "xmlhttprequest",
            "tracking file",
            "mktz",
            "varname",
            "typeradio",
            "getnow",
            "visitor",
            "explorer",
            "android",
            "unknown",
            "x3e3",
            "gfunction",
            "jfunction",
            "yfunction",
            "typeof r",
            "f3e3",
            "string",
            "typeof t",
            "function code",
            "angular",
            "angularjs",
            "ember",
            "meteor",
            "zepto",
            "jquery",
            "reduceright",
            "trackevent",
            "page",
            "number",
            "digitalocean",
            "linode",
            "home cta",
            "vultr",
            "home page",
            "demo",
            "path",
            "magento",
            "derek",
            "void",
            "code",
            "typeof l",
            "json",
            "8760",
            "image",
            "adveid",
            "typeof c",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "addtocart",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtolist",
            "contact",
            "download",
            "install",
            "typeerror",
            "quora pixel",
            "dwelltime",
            "gnu general",
            "public license",
            "sufeffxa0",
            "infinity",
            "gettitle",
            "promise",
            "hidden",
            "oref",
            "activexobject",
            "begin doc",
            "false",
            "cookiesfunction",
            "saconv",
            "pnull",
            "html",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config",
            "iframe",
            "webkittransform",
            "main",
            "maincontent",
            "placeroot",
            "generator",
            "next",
            "info"
          ],
          "references": [
            "xfe-URL-Cloudways.com-stix2-2.1-export.json",
            "https://s.adroll.com/onsite_personalization/production/0.1/static/js/main.39c29e42.js",
            "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
            "https://tags.srv.stackadapt.com/events.js",
            "https://a.quora.com/qevents.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://bat.bing.com/bat.js",
            "https://s.adroll.com/j/roundtrip.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NWBZTT",
            "https://bam-cell.nr-data.net/1/f825f6c9b9?a=1271427646&v=1215.1253ab8&to=NVNUNkBQDxADV0RQXgwZYxBbHggNBlFIF0EKRg%3D%3D&rst=3260&ck=1&ref=https://www.cloudways.com/en/&ap=335&be=1077&fe=2760&dc=1572&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1650985479670,%22n%22:0,%22f%22:498,%22dn%22:499,%22dne%22:551,%22c%22:552,%22s%22:748,%22ce%22:841,%22rq%22:841,%22rp%22:1047,%22rpe%22:1047,%22dl%22:1066,%22di%22:1561,%22ds%22:1573,%22de%22:1599,%22dc%22:2759,%22l%22:2760,%22le%22:2765%7D,%22navigation%22:",
            "https://js-agent.newrelic.com/nr-spa-1215.min.js",
            "https://serve.albacross.com/track.js",
            "https://cdn.omniconvert.com/js/a91f81f.js",
            "https://tracking.g2crowd.com/attribution_tracking/conversions/3769.js?p=https://www.cloudways.com/en/&e=",
            "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/948053426/?random=1650985487354&cv=9&fst=1650985487354&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4p0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.cloudways.com%2Fen%2F&tiba=Cloudways%3A%20Managed%20Cloud%20Hosting%20Platform%20Simplified%20-%20Cloudways&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://s.adroll.com/j/exp/UZQYN577R5CHXAGR45AYXQ/index.js",
            "https://s.adroll.com/j/pre/UZQYN577R5CHXAGR45AYXQ/3YIA4GQCONCAVH77AJMDGR/fpconsent.js",
            "https://www.cloudways.com/wp-content/cache/breeze-minification/js/breeze_44ba8066e751ddb3b497212de30fa3f9.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 494,
            "URL": 1404,
            "domain": 375,
            "FileHash-SHA256": 162,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2440,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://cdn.iubenda.com/cookie_solution/iubenda_cs/1.38.0/core-en.js",
        "https://analytics.gandi.net/piwik.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NDHW4CN",
        "https://www.gandi.net/static/js/legacy.7cc648e3ff7a.js",
        "https://www.hotjar.com/persistUtmParams.js",
        "https://assets.website-files.com/5fe451bbdf197e0597585200/css/top-injury-settlements.c4dd05676.min.css",
        "https://www.layerhost.com/assets/js/app.js",
        "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861793229&ids%5B%5D=431115301",
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d",
        "https://www.cloudways.com/wp-content/cache/breeze-minification/js/breeze_44ba8066e751ddb3b497212de30fa3f9.js",
        "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
        "https://contabo.com/client/client.a529db28.js",
        "https://www.topinjurysettlements.com/?aff_id=2509&aff_click_id=102dff654f2bfef456dd1d2ac74c17&aff_sub=&aff_sub2=1539750692232271598&aff_sub3=&aff_sub4=&aff_sub5=&source=TIS-OW-5352",
        "https://consumer-coalition.com/torts/claims.html?transaction_id=0c847626525f4bab9298573f8d509d13&affiliate_id=271198&source_id=&offer_id=8878&sub1=&sub2=1539749949624560101&sub3=",
        "Full URL from email",
        "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
        "beacon.js",
        "https://hybrid-analysis.com/sample/b324856ed3acdd48a6d7583e9ae0f36a110c28e6b1b185c231129dd4f88049af/640f60d8e122e6ac3a0f1d7e",
        "https://www.meetup.com/mu_static/react.ddd38c26.js",
        "https://s.pinimg.com/ct/lib/main.32155010.js",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
        "https://www.googletagmanager.com/gtag/js?id=G-RFD5CSNKHH",
        "https://create.lidstatic.com/campaign/0f1079a9-9aa6-a5eb-2774-38847e374a61.js?snippet_version=2",
        "http://bilety.polregio.pl",
        "https://www.googletagmanager.com/gtag/js?id=G-NP82XMKW0P&l=dataLayer&cx=c",
        "https://js.pvd.to/c/v1/pixel-1sdz.js?t=1653350400000",
        "xfe-URL-Sift.com-stix2-2.1-export.json",
        "xfe-URL-Meetup.com_pro_digitalocean_-stix2-2.1-export.json",
        "https://js-agent.newrelic.com/nr-spa-1215.min.js",
        "https://analytics.tiktok.com/i18n/pixel/config.js?sdkid=C3I4VUA8DUF9JOO44QC0&hostname=lumen.me",
        "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CPT+Sans:400,400italic,700,700italic%7COswald:200,300,400,500,600,700%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CVarela:400%7CLibre+Baskerville:regular,italic,700",
        "https://a.quora.com/qevents.js",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
        "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
        "https://cdn.trustedform.com/trustedform-1.8.25.js",
        "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c",
        "SlotBuilder.ts",
        "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1070742489&l=dataLayer&cx=c",
        "https://s.pinimg.com/ct/core.js",
        "https://api.pushnami.com/scripts/v1/pushnami-adv/5f91e677e47f06001001bb94",
        "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551",
        "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
        "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
        "https://tracking.g2crowd.com/attribution_tracking/conversions/3769.js?p=https://www.cloudways.com/en/&e=",
        "https://cdn.taboola.com/scripts/cds-pips.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/948053426/?random=1650985487354&cv=9&fst=1650985487354&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4p0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.cloudways.com%2Fen%2F&tiba=Cloudways%3A%20Managed%20Cloud%20Hosting%20Platform%20Simplified%20-%20Cloudways&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://fast.appcues.com/79878.js",
        "https://www.hushmail.com/shared/javascript/jquery-3.5.1.min.js",
        "https://login.blockchain.com/?#%2Fverify-email%2FLIhC1RPA4qIlUzBPvep8xn5FkBPW4XQlsbo7MBIxQcqfNxPUykgf2GINwzEeUKYkJMV6FJbewOlqaND96%2BR7de%2Bja2BIbLW6E6ZF2zbr05wOyVqAHx7gtq6Y4bhqFinCB3PIOH%2BlVxnfVwrzIbISyMnp7mdw%2FQU5LKoGTTnPq4v1W1uPN7iQcBlIhnNQ6QwO%3Fcontext%3DSETTINGS&#039;",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://sc-static.net/scevent.min.js",
        "https://tag.aticdn.net/616708/smarttag.js",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://s.adroll.com/j/exp/UZQYN577R5CHXAGR45AYXQ/index.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NWH4DH2",
        "https://www.hushmail.com/javascriptinclude/eNpNzEEOQDAQQNEbtVoM7Sks7GXopB0pkQ5xfWJl-5P3JWGh4AvukSRzoKKtqlWlf0Wt4k3rnG2g641Pl6QNOU83zcIn-QMj6ZHpHQ2FF97jiHOmj0ED4FxfwQOf9yPU.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
        "xfe-URL-Powr.io-stix2-2.1-export 2.json",
        "https://l.clarity.ms/s/0.6.34/clarity.js",
        "https://serve.albacross.com/track.js",
        "xfe-URL-Layerhost.com-stix2-2.1-export.json",
        "https://consumer-coalition.com",
        "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
        "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225",
        "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "https://www.meetup.com/mu_static/en-US/app.0ff22766.js",
        "https://s.adroll.com/onsite_personalization/production/0.1/static/js/main.39c29e42.js",
        "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
        "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861725881&ids%5B%5D=431115301",
        "https://www.iubenda.com/cookie-solution/confs/js/53119375.js",
        "https://cdn.polyfill.io/v2/polyfill.min.js?features=default-3.6,fetch,Intl,Intl.~locale.en-US,Array.prototype.find,Array.prototype.includes,Object.values&flags=gated",
        "https://s.adroll.com/j/pre/UZQYN577R5CHXAGR45AYXQ/3YIA4GQCONCAVH77AJMDGR/fpconsent.js",
        "https://www.hushmail.com/status/",
        "https://bat.bing.com/bat.js",
        "https://www.layerhost.com/assets/js/vendor/what-input.js",
        "https://www.hotjar.com/ensureSegmentId.js",
        "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
        "https://widget.wickedreports.com/widget.js",
        "https://cdn.heapanalytics.com/js/heap-3501642718.js",
        "xfe-IP-134.73.11.118-stix2-2.1-export.json",
        "https://www.dwin1.com/13976.js",
        "https://t.fastrk1.com/aff_c?offer_id=5352&aff_id=2509&aff_sub2=1539749374813152417",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
        "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
        "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k",
        "https://www.powr.io/powr.js?platform=html",
        "https://assets.website-files.com/5fe451bbdf197e0597585200/js/top-injury-settlements.8fa01e338.js",
        "https://www.meetup.com/proxydirectory/tags/239562121304/tag.js",
        "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
        "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
        "https://cdn.callrail.com/companies/431115301/7c8f964bc12313c75ad2/12/swap.js",
        "https://www.redditstatic.com/ads/pixel.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PF3JNK2&gtm_auth=a6AgvzJ0SAOcyjADNwrdlQ&gtm_preview=env-1&gtm_cookies_win=x",
        "https://cdn.jst.ai/mwgt_4.1.js?v=5.28",
        "https://clicks4yourserver.com/?flux_fts=tltplpzitzooaoxclaiettlpqtopzqctlizxiao68b98&list=425sml1",
        "https://www.googletagmanager.com/gtag/js?id=UA-1837381-13",
        "https://www.meetup.com/pro_static/en-US/0.f2cf4c3f.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/922061185/?random=1652546907471&cv=9&fst=1652546907471&num=1&label=BaPJCIf2_WYQgZPWtwM&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg5b0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.meetup.com%2FDigitalOceanMoscow%2F&ref=https%3A%2F%2Fwww.meetup.com%2Fpro%2Fdigitalocean%2F&tiba=DigitalOcean%20Moscow%20(Moscow%2C%20Russia)%20%7C%20Meetup&hn=www.googleadser",
        "https://s.adroll.com/j/roundtrip.js",
        "xfe-URL-t.fastrk1.com-stix2-2.1-export.json",
        "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5fe451bbdf197e0597585200",
        "https://tags.srv.stackadapt.com/events.js",
        "http://www.salesmanago.pl/static/sm.js",
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "https://www.layerhost.com/assets/js/yui.js",
        "https://analytics.tiktok.com/i18n/pixel/events.js?sdkid=C3I4VUA8DUF9JOO44QC0&lib=ttq",
        "https://github.com/meetup/swarm-ui",
        "https://www.layerhost.com/assets/js/vendor/foundation.min.js",
        "https://media.go2app.org/assets/js/dl.js",
        "https://www.layerhost.com/assets/js/slider.js",
        "https://bam-cell.nr-data.net/1/f825f6c9b9?a=1271427646&v=1215.1253ab8&to=NVNUNkBQDxADV0RQXgwZYxBbHggNBlFIF0EKRg%3D%3D&rst=3260&ck=1&ref=https://www.cloudways.com/en/&ap=335&be=1077&fe=2760&dc=1572&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1650985479670,%22n%22:0,%22f%22:498,%22dn%22:499,%22dne%22:551,%22c%22:552,%22s%22:748,%22ce%22:841,%22rq%22:841,%22rp%22:1047,%22rpe%22:1047,%22dl%22:1066,%22di%22:1561,%22ds%22:1573,%22de%22:1599,%22dc%22:2759,%22l%22:2760,%22le%22:2765%7D,%22navigation%22:",
        "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
        "https://www.googletagmanager.com/gtm.js?id=GTM-MF25KRH",
        "https://widget.trustpilot.com/trustboxes/5406e65db0d04a09e042d5fc/index.html?templateId=5406e65db0d04a09e042d5fc&businessunitId=4bdc496b000064000505a89d#locale=en-US&styleHeight=28px&styleWidth=100%25&theme=light",
        "https://widget.wickedreports.com/v2/3469/wr-dafa9fae816c2f65d24d1eb593b58626.js",
        "xfe-URL-https___www.gandi.net-stix2-2.1-export.json",
        "xfe-URL-Hush.com-stix2-2.1-export.json",
        "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
        "https://cdn.jst.ai/vck.js",
        "v6s.js",
        "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
        "nlsSDK600.bundle.min.js",
        "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js",
        "https://www.layerhost.com/assets/js/vendor/jquery.min.js",
        "https://www.clarity.ms/tag/uet/5739677",
        "https://bilety.polregio.pl",
        "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
        "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
        "https://www.googletagmanager.com/gtag/js?id=G-5VS2LL0P80&l=dataLayer&cx=c",
        "https://cdn.taboola.com/libtrc/unip/1262365/tfa.js",
        "xfe-URL-consumer-coalition.com-stix2-2.1-export.json",
        "https://www.hushmail.com/javascriptinclude/eNrLKC3OyE3MzIkvT00qzixJtSpITE_V98lPz8xzyy_K1csqtjI0MzK2MDcwsbS0ysCq2qkov7w4tSi4JLGkGFUDAF_tIM0,.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
        "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
        "apstag.js",
        "https://dna8twue3dlxq.cloudfront.net/js/profitwell.js",
        "https://www.layerhost.com/assets/js/jquery.filterizr.min.js",
        "xfe-URL-Cloudways.com-stix2-2.1-export.json",
        "https://contabo.com/client/client-30e55c50.css",
        "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NWBZTT",
        "https://cdn.sift.com/s.js",
        "https://www.gandi.net/static/js/modern.27ee934b0dc5.js",
        "webpack   buildin global.js",
        "https://cdn.omniconvert.com/js/a91f81f.js",
        "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1070742489",
        "https://script.tapfiliate.com/tapfiliate.js",
        "https://www.googleoptimize.com/optimize.js?id=OPT-TQC6JW4"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Min",
            "Filterizr api",
            "Nicu",
            "Okcancel",
            "Photostatus",
            "Eventtarget",
            "Qe",
            "Hero stripe",
            "Hj",
            "Slotbuilder",
            "Documentcookie",
            "Reduceright",
            "Vd",
            "Lj",
            "Requestbuilder"
          ],
          "industries": [
            "Legal"
          ],
          "unique_indicators": 119302
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/i.next",
    "whois": "http://whois.domaintools.com/i.next",
    "domain": "i.next",
    "hostname": "a.i.next"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69c1bd40f81db45dc044697c",
      "name": "Masterkey Clone By CallmeDoris",
      "description": "",
      "modified": "2026-03-23T22:22:56.940000",
      "created": "2026-03-23T22:22:56.940000",
      "tags": [
        "dropped file",
        "chromeua",
        "runtime data",
        "drmedgeua",
        "edgeua",
        "generator",
        "win64",
        "null",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "iframe",
        "cookie",
        "meta",
        "body",
        "legend",
        "dwis",
        "core",
        "tear",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "://masterkey.com.ua/download/MKClientSetup.exe"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "642db7b656049e54b2f71c20",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 949,
        "URL": 5642,
        "CVE": 2,
        "domain": 509,
        "FileHash-SHA256": 293,
        "FileHash-MD5": 550,
        "FileHash-SHA1": 60,
        "email": 5
      },
      "indicator_count": 8010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "26 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6844240c68255798e08beb3b",
      "name": "Bilety online: Tw\u00f3j kolejowy partner w podr\u00f3\u017cy",
      "description": "Microsoft has created a new version of its XMLHttpRequest, which allows users to access a website, via a browser or browser without the permission of a third party, using the same address.",
      "modified": "2025-07-07T00:01:51.704000",
      "created": "2025-06-07T11:35:40.942000",
      "tags": [
        "sign",
        "google sign",
        "forgot email",
        "criminalip",
        "create account",
        "bilety online",
        "sprzeday biletw",
        "polregio",
        "ssdeep",
        "license",
        "typeerror",
        "regexp",
        "promise",
        "function",
        "version",
        "typeof symbol",
        "copyright",
        "google llc",
        "apache license",
        "date",
        "without",
        "error",
        "blank",
        "trident",
        "generator",
        "class",
        "mountain view",
        "android",
        "submission",
        "california",
        "common name",
        "google inc",
        "unit android",
        "country code",
        "us state",
        "sha1",
        "sha256",
        "imphash",
        "pehash",
        "file type",
        "vhash",
        "authentihash"
      ],
      "references": [
        "http://bilety.polregio.pl",
        "https://bilety.polregio.pl",
        "http://www.salesmanago.pl/static/sm.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1295,
        "hostname": 302,
        "domain": 137,
        "FileHash-SHA256": 996,
        "FileHash-MD5": 38,
        "FileHash-SHA1": 40,
        "IPv4": 1
      },
      "indicator_count": 2809,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "286 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a54a663b348b34b12f97",
      "name": "Command and Control - 199.59.243.224",
      "description": "",
      "modified": "2023-12-06T16:46:02.873000",
      "created": "2023-12-06T16:46:02.873000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a47560e3f989a5556289",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:29.567000",
      "created": "2023-12-06T16:42:29.567000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a46fe2f276b4a4daa9f7",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:23.297000",
      "created": "2023-12-06T16:42:23.297000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a468597b81d280b67f3b",
      "name": "199.59.243.224 Command and Control",
      "description": "",
      "modified": "2023-12-06T16:42:16.587000",
      "created": "2023-12-06T16:42:16.587000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709fad03b8f1cdc6abe334",
      "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
      "description": "",
      "modified": "2023-12-06T16:22:04.700000",
      "created": "2023-12-06T16:22:04.700000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709929c16e0817dea8f7ff",
      "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
      "description": "",
      "modified": "2023-12-06T15:54:17.119000",
      "created": "2023-12-06T15:54:17.119000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 963,
        "domain": 255,
        "hostname": 730,
        "URL": 2400,
        "FileHash-MD5": 50,
        "FileHash-SHA1": 50,
        "email": 1
      },
      "indicator_count": 4449,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657099064c0c0aa442282397",
      "name": "http://www.xiazai99.com/down/soft9106.html",
      "description": "",
      "modified": "2023-12-06T15:53:42.077000",
      "created": "2023-12-06T15:53:42.077000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1040,
        "domain": 293,
        "FileHash-MD5": 58,
        "FileHash-SHA1": 56,
        "hostname": 809,
        "URL": 2661,
        "email": 1
      },
      "indicator_count": 4918,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://a.i.next",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://a.i.next",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629954.5653944
}