{
  "type": "URL",
  "indicator": "https://a.xtargeting.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://a.xtargeting.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3989272823,
      "indicator": "https://a.xtargeting.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "688ef0516013ca78448bf4e5",
          "name": "Foundry \u2022 Reflected Networks Pornhub Malvertising Subsidiary",
          "description": "Foundry ?  Pornhub\nsanfoundry.com\ncompliance.fifoundry.net- Pornhub subsidiary. Targets networks, devices, routers, used for promoting pornography and her music. Producer revealed her hooks were used for Justin Bieber &  Tori Kelly songs that. A producer stated her songs had been grifted. Both Tsara Brashears & a studio were in Pegasus & attacked by \u2018Lazarus\u2019 Group. She was told in detail how her songs can be used by music insiders if they choose.  Target trolled by mocking hackers re: the JB and Kelly song.. Trojan:Win32/DisableUAC.A!bit\n, MSIL:Suspicious:ScreenCapture.S01\nIDS Detections\nLokiBot Checkin\nLokiBot User-Agent (Charon/Inferno)\nLokiBot Application/Credential Data Exfiltration Detected M1\nLokiBot Request for C2 Commands Detected M1\nLokiBot Application/Credential Data Exfiltration Detected M2\nLokiBot Request for C2 Commands Detected M2\nTrojan Generic - POST To gate.php with no referer\nSSL excessive fatal alerts (possible POODLE attack against server)\nI will revisit this. Gloryhole Foundation?",
          "modified": "2025-09-02T04:01:31.218000",
          "created": "2025-08-03T05:14:57.402000",
          "tags": [
            "united",
            "moved",
            "entries",
            "passive dns",
            "detected m1",
            "next associated",
            "mtb apr",
            "mtb aug",
            "server",
            "gmt content",
            "trojandropper",
            "trojan",
            "body",
            "lokibot request",
            "c2 commands",
            "detected m2",
            "otx telemetry",
            "historical otx",
            "twitter running",
            "open ports",
            "cves",
            "time",
            "dynamicloader",
            "port",
            "search",
            "show",
            "destination",
            "alerts",
            "copy",
            "dynamic",
            "medium",
            "write",
            "creation date",
            "hostmaster",
            "urls",
            "domain",
            "showing",
            "hostname add",
            "pulse pulses",
            "date",
            "flag",
            "falcon sandbox",
            "name server",
            "markmonitor",
            "analysis",
            "mitre att",
            "anonymous",
            "upgrade",
            "hybrid",
            "contact",
            "usa windows",
            "december",
            "input threat",
            "level analysis",
            "summary",
            "february",
            "hwp support",
            "january",
            "october",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "calls",
            "command",
            "javascript",
            "object model",
            "model",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "temp",
            "getprocaddress",
            "script",
            "license",
            "runtime process",
            "copy md5",
            "facebook",
            "roboto",
            "error",
            "win64",
            "path",
            "blink",
            "meta",
            "factory",
            "general",
            "comspec",
            "click",
            "strings",
            "damage",
            "mini",
            "stop",
            "core",
            "expl",
            "win32",
            "gmt server",
            "ecacc saa83dd",
            "ipv4 add",
            "twitter",
            "cobalt strike",
            "mozilla"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 263,
            "FileHash-SHA1": 256,
            "FileHash-SHA256": 837,
            "hostname": 4415,
            "URL": 1918,
            "domain": 1884,
            "email": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "229 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67035385a884405e783f9a7e",
          "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
          "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
          "modified": "2024-11-06T01:02:24.390000",
          "created": "2024-10-07T03:20:37.224000",
          "tags": [
            "canada unknown",
            "redacted for",
            "as25825",
            "all scoreblue",
            "passive dns",
            "ipv4",
            "reverse dns",
            "next",
            "for privacy",
            "cname",
            "united states",
            "nxdomain",
            "ns nxdomain",
            "united",
            "as21928",
            "south korea",
            "as9318 sk",
            "taiwan as3462",
            "as701 verizon",
            "search",
            "maxage apt",
            "minage apt",
            "maxsize apt",
            "malware",
            "as44273 host",
            "creation date",
            "status",
            "showing",
            "record value",
            "certificate",
            "date",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "flag united",
            "domain",
            "files related",
            "intel",
            "ms windows",
            "users",
            "pe32",
            "number",
            "ascii text",
            "crlf line",
            "database",
            "english",
            "tue jun",
            "installer",
            "template",
            "trojan",
            "write",
            "registrar",
            "pulse submit",
            "url analysis",
            "files",
            "msie",
            "chrome",
            "rdds service",
            "record",
            "registrant",
            "admin",
            "tech contact",
            "name servers",
            "email please",
            "moved",
            "trojanproxy",
            "virtool",
            "as1221",
            "aaaa",
            "asnone united",
            "show",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "script urls",
            "gmt path",
            "fedora",
            "open ports",
            "nginx http",
            "server",
            "a domains",
            "gmt content",
            "set cookie",
            "gmt etag",
            "accept",
            "expiration date",
            "backdoor",
            "mirai",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "hostname",
            "verdict",
            "unknown",
            "new pulse",
            "loveland",
            "america asn",
            "Generic36.ABKD",
            "domains",
            "location canada",
            "as32133",
            "files ip",
            "address domain",
            "path max",
            "age86400 set",
            "cookie",
            "type",
            "entries",
            "script domains",
            "downloader",
            "body",
            "servers",
            "emails",
            "gmt max",
            "title",
            "meta",
            "as20940",
            "as16625 akamai",
            "west domains",
            "as4230 claro",
            "copy",
            "sabey",
            "contacted"
          ],
          "references": [
            "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
            "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
            "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
            "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
            "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
            "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
            "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
            "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
            "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
            "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
            "Domains Contacted: ntp.ubuntu.com",
            "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
            "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
            "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
            "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
            "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
            "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
            "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
            "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Taiwan",
            "Philippines",
            "India",
            "Italy",
            "Germany",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-BZ\\ [Trj]",
              "display_name": "ELF:Mirai-BZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai_Botnet_Malware",
              "display_name": "Mirai_Botnet_Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Unix.Trojan.Mirai-6976991-0",
              "display_name": "Unix.Trojan.Mirai-6976991-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.B",
              "display_name": "Backdoor:Linux/Mirai.B",
              "target": "/malware/Backdoor:Linux/Mirai.B"
            },
            {
              "id": "TrojanDownloader:Win32/Fosniw",
              "display_name": "TrojanDownloader:Win32/Fosniw",
              "target": "/malware/TrojanDownloader:Win32/Fosniw"
            },
            {
              "id": "TrojanClicker:Win32/Frosparf",
              "display_name": "TrojanClicker:Win32/Frosparf",
              "target": "/malware/TrojanClicker:Win32/Frosparf"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            }
          ],
          "industries": [
            "Legal",
            "Healthcare",
            "Education"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1230,
            "email": 16,
            "hostname": 1560,
            "URL": 3400,
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 544,
            "FileHash-SHA1": 496,
            "CVE": 1
          },
          "indicator_count": 8311,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "529 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc.",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "Domains Contacted: ntp.ubuntu.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojandownloader:win32/fosniw",
            "Mirai",
            "Elf:mirai-bz\\ [trj]",
            "Mirai_botnet_malware",
            "Trojan:win32/zombie.a",
            "Backdoor:linux/mirai.b",
            "Unix.trojan.mirai-6976991-0",
            "Trojanclicker:win32/frosparf"
          ],
          "industries": [
            "Legal",
            "Education",
            "Healthcare"
          ],
          "unique_indicators": 18101
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/xtargeting.com",
    "whois": "http://whois.domaintools.com/xtargeting.com",
    "domain": "xtargeting.com",
    "hostname": "a.xtargeting.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "688ef0516013ca78448bf4e5",
      "name": "Foundry \u2022 Reflected Networks Pornhub Malvertising Subsidiary",
      "description": "Foundry ?  Pornhub\nsanfoundry.com\ncompliance.fifoundry.net- Pornhub subsidiary. Targets networks, devices, routers, used for promoting pornography and her music. Producer revealed her hooks were used for Justin Bieber &  Tori Kelly songs that. A producer stated her songs had been grifted. Both Tsara Brashears & a studio were in Pegasus & attacked by \u2018Lazarus\u2019 Group. She was told in detail how her songs can be used by music insiders if they choose.  Target trolled by mocking hackers re: the JB and Kelly song.. Trojan:Win32/DisableUAC.A!bit\n, MSIL:Suspicious:ScreenCapture.S01\nIDS Detections\nLokiBot Checkin\nLokiBot User-Agent (Charon/Inferno)\nLokiBot Application/Credential Data Exfiltration Detected M1\nLokiBot Request for C2 Commands Detected M1\nLokiBot Application/Credential Data Exfiltration Detected M2\nLokiBot Request for C2 Commands Detected M2\nTrojan Generic - POST To gate.php with no referer\nSSL excessive fatal alerts (possible POODLE attack against server)\nI will revisit this. Gloryhole Foundation?",
      "modified": "2025-09-02T04:01:31.218000",
      "created": "2025-08-03T05:14:57.402000",
      "tags": [
        "united",
        "moved",
        "entries",
        "passive dns",
        "detected m1",
        "next associated",
        "mtb apr",
        "mtb aug",
        "server",
        "gmt content",
        "trojandropper",
        "trojan",
        "body",
        "lokibot request",
        "c2 commands",
        "detected m2",
        "otx telemetry",
        "historical otx",
        "twitter running",
        "open ports",
        "cves",
        "time",
        "dynamicloader",
        "port",
        "search",
        "show",
        "destination",
        "alerts",
        "copy",
        "dynamic",
        "medium",
        "write",
        "creation date",
        "hostmaster",
        "urls",
        "domain",
        "showing",
        "hostname add",
        "pulse pulses",
        "date",
        "flag",
        "falcon sandbox",
        "name server",
        "markmonitor",
        "analysis",
        "mitre att",
        "anonymous",
        "upgrade",
        "hybrid",
        "contact",
        "usa windows",
        "december",
        "input threat",
        "level analysis",
        "summary",
        "february",
        "hwp support",
        "january",
        "october",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "calls",
        "command",
        "javascript",
        "object model",
        "model",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "temp",
        "getprocaddress",
        "script",
        "license",
        "runtime process",
        "copy md5",
        "facebook",
        "roboto",
        "error",
        "win64",
        "path",
        "blink",
        "meta",
        "factory",
        "general",
        "comspec",
        "click",
        "strings",
        "damage",
        "mini",
        "stop",
        "core",
        "expl",
        "win32",
        "gmt server",
        "ecacc saa83dd",
        "ipv4 add",
        "twitter",
        "cobalt strike",
        "mozilla"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 263,
        "FileHash-SHA1": 256,
        "FileHash-SHA256": 837,
        "hostname": 4415,
        "URL": 1918,
        "domain": 1884,
        "email": 2,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 9577,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "229 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67035385a884405e783f9a7e",
      "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
      "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
      "modified": "2024-11-06T01:02:24.390000",
      "created": "2024-10-07T03:20:37.224000",
      "tags": [
        "canada unknown",
        "redacted for",
        "as25825",
        "all scoreblue",
        "passive dns",
        "ipv4",
        "reverse dns",
        "next",
        "for privacy",
        "cname",
        "united states",
        "nxdomain",
        "ns nxdomain",
        "united",
        "as21928",
        "south korea",
        "as9318 sk",
        "taiwan as3462",
        "as701 verizon",
        "search",
        "maxage apt",
        "minage apt",
        "maxsize apt",
        "malware",
        "as44273 host",
        "creation date",
        "status",
        "showing",
        "record value",
        "certificate",
        "date",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "flag united",
        "domain",
        "files related",
        "intel",
        "ms windows",
        "users",
        "pe32",
        "number",
        "ascii text",
        "crlf line",
        "database",
        "english",
        "tue jun",
        "installer",
        "template",
        "trojan",
        "write",
        "registrar",
        "pulse submit",
        "url analysis",
        "files",
        "msie",
        "chrome",
        "rdds service",
        "record",
        "registrant",
        "admin",
        "tech contact",
        "name servers",
        "email please",
        "moved",
        "trojanproxy",
        "virtool",
        "as1221",
        "aaaa",
        "asnone united",
        "show",
        "filehash",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "script urls",
        "gmt path",
        "fedora",
        "open ports",
        "nginx http",
        "server",
        "a domains",
        "gmt content",
        "set cookie",
        "gmt etag",
        "accept",
        "expiration date",
        "backdoor",
        "mirai",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "hostname",
        "verdict",
        "unknown",
        "new pulse",
        "loveland",
        "america asn",
        "Generic36.ABKD",
        "domains",
        "location canada",
        "as32133",
        "files ip",
        "address domain",
        "path max",
        "age86400 set",
        "cookie",
        "type",
        "entries",
        "script domains",
        "downloader",
        "body",
        "servers",
        "emails",
        "gmt max",
        "title",
        "meta",
        "as20940",
        "as16625 akamai",
        "west domains",
        "as4230 claro",
        "copy",
        "sabey",
        "contacted"
      ],
      "references": [
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "Domains Contacted: ntp.ubuntu.com",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "Taiwan",
        "Philippines",
        "India",
        "Italy",
        "Germany",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-BZ\\ [Trj]",
          "display_name": "ELF:Mirai-BZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai_Botnet_Malware",
          "display_name": "Mirai_Botnet_Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Unix.Trojan.Mirai-6976991-0",
          "display_name": "Unix.Trojan.Mirai-6976991-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.B",
          "display_name": "Backdoor:Linux/Mirai.B",
          "target": "/malware/Backdoor:Linux/Mirai.B"
        },
        {
          "id": "TrojanDownloader:Win32/Fosniw",
          "display_name": "TrojanDownloader:Win32/Fosniw",
          "target": "/malware/TrojanDownloader:Win32/Fosniw"
        },
        {
          "id": "TrojanClicker:Win32/Frosparf",
          "display_name": "TrojanClicker:Win32/Frosparf",
          "target": "/malware/TrojanClicker:Win32/Frosparf"
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        }
      ],
      "industries": [
        "Legal",
        "Healthcare",
        "Education"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1230,
        "email": 16,
        "hostname": 1560,
        "URL": 3400,
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 544,
        "FileHash-SHA1": 496,
        "CVE": 1
      },
      "indicator_count": 8311,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "529 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://a.xtargeting.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://a.xtargeting.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631458.2940733
}