{
  "type": "URL",
  "indicator": "https://accounts.google.com/ServiceLogin",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://accounts.google.com/ServiceLogin",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #1",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #3",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain google.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain google.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2736066001,
      "indicator": "https://accounts.google.com/ServiceLogin",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 16,
      "pulses": [
        {
          "id": "69ccd2f7984fad6feebb4ca4",
          "name": "VirusTotal report\n                    for index.html",
          "description": "The full text of the full report-to-gws, which was published on 1 April 2026, has been published online by the Csp website, following a request from the BBC>pretext .",
          "modified": "2026-04-01T08:44:36.825000",
          "created": "2026-04-01T08:10:31.621000",
          "tags": [
            "self",
            "downlink rtt",
            "html document",
            "ascii text",
            "crlf line",
            "windows",
            "linux",
            "build web",
            "html",
            "javascript",
            "https",
            "acceptencoding",
            "cookie",
            "dynamic",
            "authorization",
            "contentmd5",
            "wp engine",
            "xmsedgeref ref",
            "bl2edge1520 ref",
            "expires sun",
            "gmt date",
            "gmt xcache",
            "tcphit",
            "gmt etag",
            "b8glwd",
            "afeap",
            "bmxagc",
            "e5bfse",
            "bgs6mb",
            "bjwmce",
            "ciztgb",
            "kqhykb",
            "cxxawb",
            "fevhcf",
            "code",
            "server",
            "registrar abuse",
            "admin country",
            "expiration date",
            "registry domain",
            "registrar iana",
            "creation date",
            "admin city",
            "redmond tech",
            "samesitelax",
            "path",
            "httponly",
            "secure",
            "priorityhigh",
            "gmt contenttype",
            "contentlength",
            "connection",
            "cfray",
            "accept",
            "anycast",
            "wifi display",
            "android",
            "hdtv",
            "anycast og",
            "anything",
            "big screen",
            "mobileoptimized",
            "try shopify",
            "platform",
            "businesses",
            "shopify fb",
            "shopify og",
            "snapchat",
            "chat",
            "snaps",
            "a snap",
            "utc google",
            "adobe dynamic",
            "tag management",
            "amazon",
            "utc amazon",
            "utc facebook",
            "connect na",
            "analytics na",
            "tag manager",
            "gdlname",
            "miss",
            "drupal",
            "miss xtimer",
            "ve9 xcache",
            "miss date",
            "gmt link",
            "build",
            "home og",
            "cloudfront",
            "iad6",
            "kb body",
            "sha256",
            "aspen",
            "aspen one",
            "return",
            "transformed og",
            "aioseo",
            "site kit",
            "google",
            "file type",
            "name file",
            "html internet",
            "unicode text",
            "utf8 text"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 238,
            "URL": 367,
            "domain": 80,
            "hostname": 155,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 105,
            "email": 5,
            "IPv4": 40,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 1109,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69228447b9c71795633314df",
          "name": "Keep Corrupt - University of Alberta Incidents continue to escalate - 02.16.26",
          "description": "Recovered accounts that have been used & abused - courtesy of decisions by non-technical leadership = accounts for UAlberta students -> PW manager made inaccessible (tied to UAlberta account) during a Data-Breach.\nWhen PW manager & Accounts returned, was populated by these (many = fraudulent; some appear to be abuse of legitimate services, while others do not, yet don't know function or origin)\n\nNot representative of OG PW manager. Many (most) accts. used/abused (on-going). \n\nDon't have a backup of original = hard to compare. Don't quite know what the majority of these companies etc. are for and/or do exactly. Putting them together as they roll-in.\nCan't turn them off in most cases - I don't have access to the U of A accounts these originate from and/or original recovery methods. \n\n2 more batches to add to this pulse (Need to add into VT) 02.16.26\n\nCountries listed are where 2 victims (UAlberta Graduates) have citizenship or some tie with.",
          "modified": "2026-03-04T21:04:10.482000",
          "created": "2025-11-23T03:49:27.649000",
          "tags": [
            "geoip",
            "as54113",
            "fastly",
            "as20940",
            "as15169",
            "google",
            "as214401",
            "maincubesas",
            "gmbh",
            "apache geoip",
            "facebook",
            "UAlberta",
            "AHS",
            "Treaty 8",
            "GoA",
            "Alberta",
            "Edmonton",
            "YEG"
          ],
          "references": [
            "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a",
            "URLscanio, FSio, vT",
            "03.11.14: https://www.virustotal.com/graph/embed/ge2e309eb8bd34fcca56398089b2291058dfe1fca69dc4e5aa66db0365caf735b?theme=dark",
            "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/summary",
            "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/iocs",
            "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a (11.22.25)"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Cura\u00e7ao",
            "Guatemala",
            "Sint Maarten (Dutch part)",
            "Tanzania, United Republic of",
            "Barbados",
            "United States of America",
            "Bahamas",
            "Anguilla",
            "Canada",
            "Saint Vincent and the Grenadines",
            "United Kingdom of Great Britain and Northern Ireland",
            "Kenya",
            "France",
            "Aruba",
            "Mexico",
            "Poland",
            "Costa Rica",
            "Ireland",
            "Trinidad and Tobago",
            "Netherlands",
            "Slovakia",
            "Spain",
            "Philippines"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government",
            "Technology",
            "Telecommunications",
            "Education",
            "Healthcare",
            "Finance",
            "Retail",
            "Hospitality",
            "Transportation"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CIDR": 47,
            "FileHash-MD5": 32,
            "FileHash-SHA1": 12,
            "FileHash-SHA256": 1047,
            "URL": 4006,
            "domain": 2126,
            "email": 412,
            "hostname": 2122,
            "CVE": 1
          },
          "indicator_count": 9805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 134,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6953faf8bc5d0bacd899eb5a",
          "name": "Virus Share - Apple monitors targeted Apple users via Apple devices",
          "description": "Malware packed! Virus Share Apple monitors targeted Apple users via Apple devices. Adversaries gain access to select users maintaining full CnC. \nDevices are modified , security disabled, adversaries exploit privileges collecting email, cnc of app store , browsers, WebKit, cameras, conversations, streaming cloud accounts , texts , etc. In this example keylogger installed, email collection enabled. Device able to connect to random devices or soundbars w/o WiFi or Bluetooth being enabled. Hight probability (in a notable example)  devices may not have connected to client ISP / NSP, cell towers due to a deauthor, signal jamming ,remotely unlocked devices, zombie devices.",
          "modified": "2026-01-29T15:02:39.082000",
          "created": "2025-12-30T16:16:56.677000",
          "tags": [
            "yara detections",
            "wacup support",
            "taglib library",
            "av detections",
            "library exe",
            "internalname",
            "nullsoft",
            "darren owen",
            "a domains",
            "musicbrainz",
            "script urls",
            "germany",
            "ip address",
            "title",
            "paris",
            "dnssec",
            "name robert",
            "kaye name",
            "org metabrainz",
            "foundation inc",
            "south higuera",
            "luis obispo",
            "country us",
            "rob@metabrainz.org",
            "robert kaye",
            "san luis obispo",
            "united",
            "aaaa",
            "servers",
            "moved",
            "certificate",
            "urls",
            "win32mydoom dec",
            "trojan",
            "expiration date",
            "dynamicloader",
            "crlf line",
            "unicode text",
            "utf8",
            "ee fc",
            "ff d5",
            "yara rule",
            "ascii text",
            "f0 ff",
            "eb e1",
            "unknown",
            "write",
            "malware",
            "autorun",
            "suspicious",
            "backdoor",
            "found",
            "gmt connection",
            "control",
            "twitter",
            "verisign",
            "write c",
            "show",
            "time stamping",
            "read c",
            "search",
            "class",
            "present",
            "passive dns",
            "ipv4 add",
            "pulse pulses",
            "files",
            "script script",
            "a li",
            "div div",
            "a div",
            "content type",
            "script",
            "ul div",
            "life",
            "meta",
            "agent",
            "stack",
            "present oct",
            "gmt content",
            "type",
            "asn as3561",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "as15169",
            "virustotal",
            "mcafee",
            "drweb",
            "vipre",
            "downloader",
            "panda",
            "local",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "defense evasion",
            "spawns",
            "t1480 execution",
            "api call",
            "monitored target",
            "united states",
            "present dec",
            "lowfi",
            "trojanspy",
            "win32upatre dec",
            "status",
            "present nov",
            "worm",
            "worm",
            "network",
            "zombie devices",
            "prefetch8",
            "localappdata",
            "prefetch1",
            "command decode",
            "programfiles",
            "edge",
            "show process",
            "show technique",
            "mitre att",
            "ck matrix",
            "process",
            "potential ip",
            "network traffic",
            "t1071",
            "win64",
            "general",
            "path",
            "analysis tip",
            "click",
            "process details"
          ],
          "references": [
            "VirusShare_d1ed959764dc880eac854dcf699ad1f0 2021",
            "[.]apple.com",
            "Yara Detections: ConventionEngine_Anomaly_Short_TripleChar + RSDS",
            "WACUP Support Library FileVersion\t3.3.3.0 InternalName\tnde.dll",
            "LegalCopyright:Copyright \u00a9 2003-2007 Nullsoft, Inc.",
            "Modifications by Darren Owen aka DrO \u00a9 2016-2025 OriginalFilename: nde.dll",
            "wacup-1-99-27-21136.exe \u2022 SHA256 4c16b4976cb9efe9db96743620763076890be297f7f5522b640984c28ac61d33",
            "InternalName\ttag.dll OriginalFilename: tag.dll ProductName: WACUP TagLib Library ProductVersion: 1.13.1.26",
            "IDS Detection: Worm.Mydoom Checkin User-Agent (explwer) Observed DNS Query to .biz TLD",
            "Alerts: network_bind persistence_autorun polymorphic procmem_yara static_pe_anomaly",
            "Alerts: suricata_alert antivm_generic_diskreg antisandbox_sleep dynamic_function_loading network_http More IP\u2019s Contacted  51.81.61.70 202.12.124.216  17.171.208.6  64.70.19.203  67.195.228.106  103.129.252.44 Less Domains Contacted 21 Domains Contacted sprrmnrhen.biz qhphrpesma.info swwsppwqsh.biz pwpnhsawsn.in hhhmnaprsn.net 126.com 126mx00.mxmail.netease.com yahoo.com mta7.am0.yahoodns.net rrwerqrhma.org",
            "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside",
            "Yara Detections: , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
            "Win.Trojan.Ramnit-5482 Yara Detections: Nullsoft_NSIS Alerts: allocates_rwx has_authenticode pe_features",
            "mailrelay.203.website.ws \u2022 website.ws Files IP Address: 64.70.19.170 Location: United States",
            "ASN AS3561 Century Link Communications Llc Nameservers: ns5.ncsdi.ws.",
            "WebSite.ws \u2018Your Internet Address for Life\u2019",
            "http://images2.website.ws/kvmlm2/images/13/bg_1bot.png",
            "MyDoom: 64.70.19.203 Command and Control",
            "Owner/Provider: Association: AS3561 (large hosting or CDN provider like Level 3/CenturyLink)",
            "Type: CDN Webserver",
            "64.70.19.203 is identified in cybersecurity reports & malware analysis as a malicious IP address",
            "64.70.19.203 associated with botnet Command and Control (C&C) servers."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "!SmartInstallMaker_v504",
              "display_name": "!SmartInstallMaker_v504",
              "target": null
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "Win.Malware.Cerbu-9952502-0",
              "display_name": "Win.Malware.Cerbu-9952502-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Ramnit-5482",
              "display_name": "Win.Trojan.Ramnit-5482",
              "target": null
            },
            {
              "id": "Autorun",
              "display_name": "Autorun",
              "target": null
            },
            {
              "id": "Downloader.Generic7.ATSS",
              "display_name": "Downloader.Generic7.ATSS",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Banload",
              "display_name": "TrojanDownloader:Win32/Banload",
              "target": "/malware/TrojanDownloader:Win32/Banload"
            },
            {
              "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Trojan:Win32/Upatre",
              "display_name": "Trojan:Win32/Upatre",
              "target": "/malware/Trojan:Win32/Upatre"
            },
            {
              "id": "Win.Malware.Pits",
              "display_name": "Win.Malware.Pits",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski",
              "display_name": "Backdoor:Win32/Fynloski",
              "target": "/malware/Backdoor:Win32/Fynloski"
            },
            {
              "id": "#LowFI:VBExpensiveLoop",
              "display_name": "#LowFI:VBExpensiveLoop",
              "target": null
            },
            {
              "id": "TrojanSpy:MSIL/Omaneat.A",
              "display_name": "TrojanSpy:MSIL/Omaneat.A",
              "target": "/malware/TrojanSpy:MSIL/Omaneat.A"
            },
            {
              "id": "Win.Trojan.Nmzbaak8fvob-10038731-0",
              "display_name": "Win.Trojan.Nmzbaak8fvob-10038731-0",
              "target": null
            },
            {
              "id": "TEL:Trojan:Win32/REDFLARE_1",
              "display_name": "TEL:Trojan:Win32/REDFLARE_1",
              "target": null
            },
            {
              "id": "TEL:HSTR:Win32/SetFTAHash",
              "display_name": "TEL:HSTR:Win32/SetFTAHash",
              "target": null
            },
            {
              "id": "Win.Malware.Pits-10035540-0",
              "display_name": "Win.Malware.Pits-10035540-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3861,
            "URL": 296,
            "hostname": 213,
            "FileHash-MD5": 971,
            "FileHash-SHA1": 864,
            "email": 16,
            "domain": 53,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 6276,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "80 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69238035a56276b95c898fc8",
          "name": "Google Malcert - 11.25.25",
          "description": "https://tria.ge/251123-ztj19sdm3t/behavioral1\n\nd6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668\ndistrusted_certs\nResearchers at the University of California at Berkeley, in the US, have decoded a series of key information about Google users, which they hope will help them to find out about the firm's products and services.",
          "modified": "2025-12-23T21:05:26.373000",
          "created": "2025-11-23T21:44:21.109000",
          "tags": [
            "kqhykb",
            "snun3",
            "yv5bee",
            "remote address",
            "in a",
            "nj1rfe",
            "pphkqf",
            "ciztgb",
            "sdcwhb",
            "leikze",
            "accept",
            "please",
            "javascript",
            "triage",
            "malware",
            "analysis",
            "report",
            "reported",
            "analyze",
            "sandbox",
            "monitor",
            "sample",
            "resource",
            "general",
            "config",
            "signatures",
            "processes",
            "network",
            "replay",
            "copy",
            "target",
            "score"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/060884406dcbb77a17da44b51d390058edb73ce1f09674f8dcde393a78916c46/iocs",
            "https://tria.ge/251123-ztj19sdm3t/behavioral1",
            "https://tria.ge/251125-y86m5ssjfp/behavioral2",
            "https://hybrid-analysis.com/sample/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668",
            "https://polyswarm.network/scan/results/file/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 29,
            "FileHash-SHA1": 29,
            "FileHash-SHA256": 30,
            "URL": 58,
            "domain": 4,
            "hostname": 15,
            "CVE": 1
          },
          "indicator_count": 166,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "117 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68958d96a43dd0d3b5a65220",
          "name": "Mirai Communication Networks Inc",
          "description": "BGP Mirai Communication Networks Inc. May be used for Red Hat activities considered enterprise open source solutions. Used for adversarial motives. Abuse.\nResearched a device-local-**********.remotewd.com found in last residential community a monitored target lived.",
          "modified": "2025-09-07T05:03:49.633000",
          "created": "2025-08-08T05:39:34.315000",
          "tags": [
            "united",
            "unknown ns",
            "moved",
            "passive dns",
            "ip address",
            "cloudfront x",
            "hio50 c1",
            "a domains",
            "domains",
            "meta",
            "mirai",
            "apache",
            "url hostname",
            "server response",
            "google safe",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "command",
            "found",
            "mitre att",
            "ck techniques",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "size",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "show technique",
            "ck matrix",
            "adversaries",
            "general",
            "starfield",
            "iframe",
            "onload",
            "status",
            "urls",
            "domain",
            "name servers",
            "hostname",
            "files",
            "files ip",
            "certificate",
            "urls show",
            "results aug",
            "entries",
            "show process",
            "utf8",
            "crlf line",
            "network traffic",
            "title error",
            "next associated",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "meta http",
            "equiv content",
            "win32",
            "trojan",
            "servers",
            "search",
            "whois show",
            "record value",
            "emails",
            "name legal",
            "department name",
            "address po",
            "city seattle",
            "present oct",
            "present jul",
            "present dec",
            "present aug",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "data upload",
            "extraction",
            "include review",
            "exclude sugges",
            "uny inuuue",
            "find s",
            "extr",
            "typ dom",
            "failed",
            "extri data",
            "mirai meta",
            "japan unknown",
            "miraipcok meta",
            "overview ip",
            "address",
            "location united",
            "asn as15169",
            "nameservers",
            "less whois",
            "registrar",
            "overview domain",
            "address domain",
            "ip whois",
            "title",
            "create c",
            "read c",
            "delete",
            "write",
            "medium",
            "create",
            "showing",
            "rgba",
            "next",
            "dock",
            "execution",
            "malware",
            "sqlite rollback",
            "jfif",
            "journal",
            "regsetvalueexa",
            "ascii",
            "regdword",
            "baidu",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "redacted for",
            "unknown aaaa",
            "hostname add",
            "url analysis",
            "encrypt",
            "date",
            "germany unknown",
            "ascio",
            "creation date",
            "alfper",
            "ipv4 add",
            "reverse dns",
            "mozilla",
            "set spray",
            "pty ltd",
            "date checked",
            "present jun",
            "present nov",
            "present may",
            "present mar",
            "present sep",
            "present jan",
            "for privacy",
            "lngen",
            "ransom",
            "virtool",
            "exploit",
            "as133618",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "asn as133618",
            "whois registrar",
            "ietfdtd html",
            "gmt server",
            "debian",
            "dynamicloader",
            "unknown",
            "feat",
            "query",
            "installer",
            "results oct",
            "results jan",
            "aaaa",
            "tlsv1",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "ogoogle trust",
            "cngts ca",
            "lowfi",
            "urlshortner aug",
            "urlshortner jul",
            "urlshortner",
            "write c",
            "high",
            "et exploit",
            "probe ms17010",
            "f codeoverlap",
            "copy",
            "contacted",
            "w3wwhb",
            "svwjh5dd u",
            "uv5b usvwu",
            "f us3v9",
            "cu codeoverlap",
            "filehash",
            "sha256 add",
            "monitored target",
            "sloffeefoundry.com",
            "apple",
            "samsung",
            "galaxy",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "persistence",
            "edge",
            "bing",
            "racism",
            "amazon music",
            "ios",
            "twitter",
            "googleapis",
            "denver"
          ],
          "references": [
            "Researched: 210.172.192.15 | p192015.mirai.ne.jp  | sanso-mirai.jp",
            "Mirai Communication Network Inc. (AS7690) Seto, Japan ASN is a BGP Network",
            "*ccm-command-center.int.m1np.symetra.cloud",
            "Monitored Target/s",
            "https://hybrid-analysis.com/sample/ff37a006ed8677bafa412d653ce9adfe84744702f28f7dfe9f5f4ec51b599419/689505a3a647793a0300f73f",
            "https://hybrid-analysis.com/sample/d30cf86f09e3ab7bb7d0a4ac2608aafb31e07c94fe77f5a264ccdb35fe153c59/689505ded9be5613900509fd",
            "https://hybrid-analysis.com/sample/f6e628e57373bf795bae87c883dcaefdbb720960133edc1adacc6146d10fc88a",
            "https://otx.alienvault.com/indicator/ip/210.172.192.15",
            "https://otx.alienvault.com/indicator/domain/sanso-mirai.jp",
            "device-local-**********. remotewd.com",
            "https://sms-apple.com/login",
            "https://www.exito.com/galaxy-m12-64-gb-negro-samsung-sm-m127fzkkcoo-3016108/p",
            "https://4.img-dpreview.com/files/p/articles/2356747397/samsung_nv24hd_bk.jpeg",
            "https://shell-gift.website/sweeps/de/amazon-voucher/question1000-agg/index.html?uclick=qdlpqnvr&uclickhash=qdlpqnvr-qdlpqnvr-pmwj-0-xsi4-hovr-hoi4-9b6533",
            "api.omgpornpics.com",
            "http://www.mylifelawyer.com/services/denver-affordable-lawyer-child-custody/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Crypt-142",
              "display_name": "Win.Trojan.Crypt-142",
              "target": null
            },
            {
              "id": "#Lowfi:SIGATTR:URLShortner",
              "display_name": "#Lowfi:SIGATTR:URLShortner",
              "target": null
            },
            {
              "id": "Win.Trojan.14278494-1",
              "display_name": "Win.Trojan.14278494-1",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ransom:Win32/WannaCrypt.H",
              "display_name": "ransom:Win32/WannaCrypt.H",
              "target": "/malware/ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Mirai Communications",
              "display_name": "Mirai Communications",
              "target": null
            },
            {
              "id": "Alfper",
              "display_name": "Alfper",
              "target": null
            },
            {
              "id": "telper:HSTR:CLEAN:Ninite",
              "display_name": "telper:HSTR:CLEAN:Ninite",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8962,
            "domain": 1671,
            "hostname": 2125,
            "FileHash-SHA256": 2031,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 523,
            "SSLCertFingerprint": 12,
            "email": 7,
            "CVE": 1
          },
          "indicator_count": 16050,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "224 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "684c65464466dd19b089f325",
          "name": "Zesp\u00f3\u0142 Profilaktyki i Rehabilitacji w Janowicach Wielkich - YouTube",
          "description": "If d=void 0===c,w(\"trustedResourceUrl\",d: \"Trusted resourceUrl,\" thend=c.src,d, c.js, then d:",
          "modified": "2025-06-13T17:56:28.689000",
          "created": "2025-06-13T17:52:06.399000",
          "tags": [
            "rehabilitacji w",
            "youtube tv",
            "dami jelenia",
            "tv dami",
            "jelenia gra",
            "zakupy wycz",
            "jeli",
            "nie korzystasz",
            "filmy",
            "aby tego",
            "copyright",
            "closure library",
            "argument",
            "ifunction",
            "error",
            "null",
            "type",
            "cast",
            "webchannel",
            "su2028u2029",
            "chrome",
            "xmlhttp",
            "kkvoid",
            "remotecontrol",
            "android",
            "unknown",
            "screen",
            "desktop",
            "function",
            "string",
            "array",
            "number",
            "vfunction",
            "f8192",
            "n432",
            "true",
            "j2048",
            "this",
            "window",
            "void",
            "date",
            "pokau017c",
            "pytfunction",
            "fe8function",
            "qgzfunction",
            "afunction",
            "hb28",
            "r150",
            "promise",
            "bigint",
            "post",
            "edge",
            "swhealthlog",
            "symbol",
            "trident",
            "infinity",
            "embed",
            "webkitkeyframes",
            "zoomin",
            "zoominx",
            "zoomoutx",
            "zoominy",
            "zoomouty",
            "2000px",
            "90deg",
            "20px",
            "30deg",
            "30px",
            "10px",
            "10deg",
            "3deg",
            "5deg",
            "djmegamenu",
            "use license",
            "tabindex",
            "menu",
            "close",
            "msie",
            "beforechange",
            "imagehassize",
            "buildcontrols",
            "magnific popup",
            "dmitry semenov",
            "http",
            "beforeclose",
            "afterclose",
            "open",
            "next",
            "open source",
            "bsd license",
            "george mcginley",
            "smith",
            "djimageslider",
            "subpackage",
            "webkit",
            "khtml",
            "icab",
            "countto",
            "callback",
            "handler",
            "object",
            "typeof",
            "method",
            "gnugplv2",
            "website",
            "set module",
            "height script",
            "regexp",
            "screenheight",
            "highcontrast2",
            "highcontrast3",
            "highcontrast",
            "wide",
            "night",
            "body",
            "normalbutton",
            "cookie plugin",
            "https",
            "klaus hartl",
            "mit license",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "sticky bar",
            "stickybar",
            "count",
            "offcanvas",
            "html",
            "noscroll",
            "offcanvas var",
            "toggle nav",
            "click jquery",
            "ajax",
            "autocomplete",
            "tomas kirda",
            "typeof define",
            "esc27",
            "tab9",
            "return13",
            "left37",
            "up38",
            "twitter",
            "custom version",
            "joomla",
            "rolemenu",
            "boolean",
            "get adobe",
            "flash player",
            "title",
            "text",
            "typeof data",
            "typeof s",
            "accept",
            "width",
            "foundation",
            "backspace8",
            "comma188",
            "delete46",
            "down40",
            "end35",
            "enter13",
            "escape27",
            "value",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "xtablet768",
            "document",
            "ui sortable",
            "leftright",
            "gnu general",
            "public license",
            "dddddd",
            "ffffcc",
            "eeeeee",
            "verdana",
            "geneva",
            "arial",
            "helvetica",
            "f0f0f0",
            "sans",
            "charset",
            "utf8",
            "fontawesome",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "general slider",
            "slide",
            "rgba",
            "navigation",
            "15deg",
            "300px",
            "20deg",
            "transition",
            "scale",
            "baskerville",
            "main image",
            "bdbdbd",
            "f3f3f3",
            "remove",
            "fontface",
            "woff2",
            "u0131",
            "u01520153",
            "u02bb02bc",
            "u02c6",
            "u02da",
            "u02dc",
            "u0304",
            "dirrtl",
            "msviewport",
            "href",
            "span",
            "legend",
            "halflings",
            "fieldset",
            "typeimage",
            "f2f2f2",
            "d9edf7",
            "dff0d8",
            "f2dede",
            "thead",
            "tbody",
            "tahoma",
            "00a0",
            "video",
            "script",
            "2500",
            "xnew ita",
            "dnew jta",
            "dataset",
            "orfunction",
            "prfunction",
            "nsafunction",
            "xsafunction",
            "vrfunction",
            "cakes",
            "ovbfunction",
            "pvbfunction",
            "rvbfunction",
            "qvbfunction",
            "tvbfunction",
            "uvbfunction",
            "vvbclass",
            "xvbclass",
            "yvbclass",
            "svbclass",
            "lvafunction",
            "ggfunction",
            "mvafunction",
            "ovafunction",
            "pvafunction",
            "uvafunction",
            "tvafunction",
            "qvafunction",
            "vvafunction",
            "nvaclass",
            "dark",
            "vector",
            "yy49",
            "raster",
            "roboto",
            "new tk",
            "qael",
            "przechyl",
            "mars",
            "mercury",
            "venus",
            "pluto",
            "titan",
            "weakset",
            "wfclass",
            "googlelayer",
            "uint8array",
            "weakmap",
            "5001",
            "mouseevent",
            "webassembly",
            "180180",
            "9090",
            "google maps",
            "javascript api",
            "internal",
            "small",
            "lightrail",
            "false",
            "february",
            "light",
            "hybrid",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "gc"
          ],
          "references": [
            "embed.html",
            "ad_status.js.pobrane",
            "f5Y41t9wqY4.html",
            "cast_sender.js.pobrane",
            "remote.js.pobrane",
            "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
            "embed.js.pobrane",
            "www-embed-player.js.pobrane",
            "animate.ext.css",
            "animate.min.css",
            "jquery.djmegamenu.js.pobrane",
            "jquery.djmobilemenu.js.pobrane",
            "magnific.js.pobrane",
            "jquery.easing.min.js.pobrane",
            "slider.js.pobrane",
            "jquery.countTo.js.pobrane",
            "scripts.js.pobrane",
            "magnific-init.js.pobrane",
            "pagesettings.js.pobrane",
            "jquery.cookie.js.pobrane",
            "stickybar.js.pobrane",
            "fontswitcher.js.pobrane",
            "offcanvas.js.pobrane",
            "jquery.autocomplete.min.js.pobrane",
            "bootstrap.min.js.pobrane",
            "jcemediabox.js.pobrane",
            "jquery.ui.core.min.js.pobrane",
            "jquery-migrate.min.js.pobrane",
            "layout.min.js.pobrane",
            "jquery.ui.sortable.min.js.pobrane",
            "caption.js.pobrane",
            "finder.css",
            "jquery-noconflict.js.pobrane",
            "djmegamenu.26.css",
            "animations.css",
            "djmobilemenu.css",
            "jquery.min.js.pobrane",
            "djimageslider.css",
            "offcanvas.css",
            "magnific.css",
            "font_switcher.26.css",
            "css",
            "template_responsive.26.css",
            "offcanvas.26.css",
            "bootstrap_responsive.26.css",
            "extended_layouts.26.css",
            "style.css",
            "content.css",
            "template.26.css",
            "bootstrap.26.css",
            "jcemediabox.css",
            "js",
            "onion.js.pobrane",
            "search_impl.js.pobrane",
            "overlay.js.pobrane",
            "map.js.pobrane",
            "util.js.pobrane",
            "search.js.pobrane",
            "common.js.pobrane",
            "geometry.js.pobrane",
            "main.js.pobrane"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2779,
            "hostname": 661,
            "domain": 684,
            "email": 4,
            "FileHash-MD5": 1,
            "FileHash-SHA256": 689
          },
          "indicator_count": 4818,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "310 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67d0fc5ede5b93d17a15a654",
          "name": "Threat Intelligence - Pulsedive - Login to XUSOM GMAIL",
          "description": "Google.com has a security certificate that allows it to access all its users' data, even if they have no access to it, and the full set of security details that can be accessed.\n\nYet another Impacted MD School - this is just the google login page....\nData from Pulsedive Browser Extension",
          "modified": "2025-04-11T03:03:55.658000",
          "created": "2025-03-12T03:15:42.664000",
          "tags": [
            "gmail login",
            "xusom",
            "ssl certificate",
            "threat intelligence",
            "feed",
            "ioc",
            "change theme",
            "contact us",
            "intelligence",
            "threats api",
            "analyze api",
            "overview",
            "threats explore",
            "rate limits",
            "stixtaxii",
            "bulk export",
            "Cryptojacking",
            "JS Crypto Miner",
            "Malware (General)",
            "Phishing (General)",
            "Simda (Malware)",
            "Spamming (General)",
            "SSH Brute Force (General)",
            "Suppobox (Malware)",
            "TOR Proxy (Tool)",
            "Pulsedive"
          ],
          "references": [
            "https://pulsedive.com/indicator/?iid=276882&utm_medium=addon&utm_source=popup",
            "",
            "https://www.virustotal.com/gui/url/e3e416c6754a125f3fa199ab3ce50ab9b26b2074245b14c745498af43fe7f19d/community"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Aruba",
            "Panama",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Education",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 71,
            "hostname": 45,
            "URL": 2
          },
          "indicator_count": 118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "373 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d34c8a64436a7aee2e25a1",
          "name": "Locky: File Deletion targeting incriminating archived files.",
          "description": "redhatdelete.com : Adversaries are deleting files in bulk  from Virustotal, otx AlienVault, WebArchive, Perma.cc Urlscan.io, Archive.Today, Archive.ph, iCloud, apple data, photo deletion.\nVarious ransomware used. iOS service modified, cloud encrypted by adversary. Indicator point to a target with a zombie device. An iPhone and potentially other devices were targeted in a specific attack. | Locky Ransomware is a piece of malware that encrypts important files on your device, rendering them inaccessible and unusable.",
          "modified": "2024-03-20T12:00:39.809000",
          "created": "2024-02-19T12:41:46.707000",
          "tags": [
            "it consultant",
            "uk collection",
            "dns intel",
            "ips collection",
            "suspicous ip",
            "whois file",
            "cname",
            "record type",
            "ttl value",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "whois lookup",
            "region create",
            "domain",
            "name server",
            "registrant name",
            "technical city",
            "region update",
            "united",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "ck id",
            "cookie",
            "meta",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "dns replication",
            "code",
            "namecheap",
            "registrar abuse",
            "namecheap inc",
            "privacy service",
            "withheld",
            "privacy",
            "dnssec",
            "email",
            "first",
            "bodis",
            "unknown",
            "creation date",
            "search",
            "emails",
            "as397240",
            "date",
            "next",
            "all octoseek",
            "threat roundup",
            "january",
            "june",
            "historical ssl",
            "referrer",
            "contacted",
            "group",
            "execution",
            "phishing",
            "malware",
            "core",
            "malicious",
            "dark power",
            "play ransomware",
            "pe32",
            "intel",
            "ms windows",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "icons library",
            "os2 executable",
            "pe32 linker",
            "gnu linker",
            "compiler",
            "info header",
            "name md5",
            "overlay",
            "passive dns",
            "entries",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "trojan",
            "location united",
            "query",
            "activity dns",
            "observed dns",
            "msie",
            "high",
            "copy",
            "write",
            "win32",
            "hashes",
            "host interaction",
            "sabey type",
            "hallrender",
            "brian sabey",
            "memory pattern",
            "http requests",
            "http method",
            "get response",
            "dns resolutions",
            "ip traffic",
            "domains",
            "mutex",
            "samplepath",
            "created",
            "shell commands",
            "r processes",
            "tree",
            "analyze",
            "hostnames",
            "url https",
            "samples",
            "hostname",
            "pattern urls",
            "memory",
            "pattern",
            "pattern domains",
            "roundup",
            "formbook",
            "mirai",
            "ben c",
            "injection",
            "server",
            "scan endpoints",
            "show",
            "august",
            "bq feb",
            "chrome",
            "precondition",
            "virtool",
            "downloadmr",
            "body",
            "status",
            "servers",
            "record value",
            "name servers",
            "showing",
            "mailrubar",
            "trojanclicker",
            "slcc2",
            "media center",
            "delete c",
            "malware beacon",
            "suspicious",
            "class",
            "internal",
            "local",
            "encrypt",
            "as15169 google",
            "gmt cache",
            "twitter",
            "rostpay",
            "date hash",
            "avast avg",
            "mtb may",
            "susp",
            "cryp",
            "win32upatre may",
            "mtb showing",
            "lowfi",
            "aaaa",
            "win32pcmega jan",
            "urlshortner dec",
            "urlshortner sep",
            "as133618",
            "nxdomain",
            "as133775 xiamen",
            "germany unknown",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "resolutions",
            "critical risk",
            "apple phone",
            "unlocker",
            "shell code",
            "installer",
            "ursnif",
            "hacktool",
            "emotet",
            "tracker",
            "chaos",
            "ransomexx",
            "xor ddos",
            "xorddos",
            "mitre attack",
            "parent domain",
            "urls url",
            "siblings",
            "metro",
            "communicating",
            "collection",
            "dropped",
            "skynet",
            "youth",
            "com laude",
            "ltd dba",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "akamaias",
            "digitaloceanasn",
            "csc corporate",
            "pt mora",
            "univjos",
            "etisalat misr",
            "acurix networks",
            "pty ltd",
            "beijing baidu",
            "highly targeted",
            "http",
            "network hijacks",
            "redline stealer",
            "whois sslcert",
            "contacted urls",
            "whois whois",
            "september",
            "hidden cobra",
            "threats",
            "kimsuky",
            "service",
            "read c",
            "create c",
            "write c",
            "regsetvalueexa",
            "mozilla",
            "capture",
            "asnone",
            "domain http",
            "request",
            "malware dns",
            "lookup wannacry",
            "default",
            "ransom",
            "push",
            "playgame",
            "command",
            "email document",
            "exploit domain",
            "owner exploit",
            "kit exploit",
            "source file",
            "hacking tools",
            "hunting macro",
            "malware hosting",
            "memory scanning",
            "yara detections",
            "debug",
            "icmp traffic",
            "pdb path",
            "pe section",
            "low software",
            "packing t1045",
            "ransomware",
            "egregor",
            "find",
            "false",
            "psexec",
            "powershell",
            "qakbot",
            "qbot",
            "icedid"
          ],
          "references": [
            "redhatdelete.com",
            "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
            "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
            "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
            "Trojan-Ransom.Win32.Blocker.jgb Checkin",
            "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "target": null
            },
            {
              "id": "Rostpay",
              "display_name": "Rostpay",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "Chaos (ELF)",
              "display_name": "Chaos (ELF)",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/GameHack",
              "display_name": "TrojanDropper:Win32/GameHack",
              "target": "/malware/TrojanDropper:Win32/GameHack"
            },
            {
              "id": "Win.Ransomware.Locky-7766366-0",
              "display_name": "Win.Ransomware.Locky-7766366-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_pid",
              "display_name": "ALF:E5.SpikeAex.rhh_pid",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 65,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1848,
            "FileHash-SHA1": 1783,
            "FileHash-SHA256": 7170,
            "domain": 1649,
            "hostname": 1191,
            "email": 9,
            "URL": 729,
            "CVE": 2,
            "SSLCertFingerprint": 2,
            "CIDR": 1
          },
          "indicator_count": 14384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "760 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d34c91868744aa1449fef2",
          "name": "Locky: File Deletion targeting incriminating archived files.",
          "description": "redhatdelete.com : Adversaries are deleting files in bulk  from Virustotal, otx AlienVault, WebArchive, Perma.cc Urlscan.io, Archive.Today, Archive.ph, iCloud, apple data, photo deletion.\nVarious ransomware used. iOS service modified, cloud encrypted by adversary. Indicator point to a target with a zombie device. An iPhone and potentially other devices were targeted in a specific attack. | Locky Ransomware is a piece of malware that encrypts important files on your device, rendering them inaccessible and unusable.",
          "modified": "2024-03-20T12:00:39.809000",
          "created": "2024-02-19T12:41:52.846000",
          "tags": [
            "it consultant",
            "uk collection",
            "dns intel",
            "ips collection",
            "suspicous ip",
            "whois file",
            "cname",
            "record type",
            "ttl value",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "whois lookup",
            "region create",
            "domain",
            "name server",
            "registrant name",
            "technical city",
            "region update",
            "united",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "ck id",
            "cookie",
            "meta",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "dns replication",
            "code",
            "namecheap",
            "registrar abuse",
            "namecheap inc",
            "privacy service",
            "withheld",
            "privacy",
            "dnssec",
            "email",
            "first",
            "bodis",
            "unknown",
            "creation date",
            "search",
            "emails",
            "as397240",
            "date",
            "next",
            "all octoseek",
            "threat roundup",
            "january",
            "june",
            "historical ssl",
            "referrer",
            "contacted",
            "group",
            "execution",
            "phishing",
            "malware",
            "core",
            "malicious",
            "dark power",
            "play ransomware",
            "pe32",
            "intel",
            "ms windows",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "icons library",
            "os2 executable",
            "pe32 linker",
            "gnu linker",
            "compiler",
            "info header",
            "name md5",
            "overlay",
            "passive dns",
            "entries",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "trojan",
            "location united",
            "query",
            "activity dns",
            "observed dns",
            "msie",
            "high",
            "copy",
            "write",
            "win32",
            "hashes",
            "host interaction",
            "sabey type",
            "hallrender",
            "brian sabey",
            "memory pattern",
            "http requests",
            "http method",
            "get response",
            "dns resolutions",
            "ip traffic",
            "domains",
            "mutex",
            "samplepath",
            "created",
            "shell commands",
            "r processes",
            "tree",
            "analyze",
            "hostnames",
            "url https",
            "samples",
            "hostname",
            "pattern urls",
            "memory",
            "pattern",
            "pattern domains",
            "roundup",
            "formbook",
            "mirai",
            "ben c",
            "injection",
            "server",
            "scan endpoints",
            "show",
            "august",
            "bq feb",
            "chrome",
            "precondition",
            "virtool",
            "downloadmr",
            "body",
            "status",
            "servers",
            "record value",
            "name servers",
            "showing",
            "mailrubar",
            "trojanclicker",
            "slcc2",
            "media center",
            "delete c",
            "malware beacon",
            "suspicious",
            "class",
            "internal",
            "local",
            "encrypt",
            "as15169 google",
            "gmt cache",
            "twitter",
            "rostpay",
            "date hash",
            "avast avg",
            "mtb may",
            "susp",
            "cryp",
            "win32upatre may",
            "mtb showing",
            "lowfi",
            "aaaa",
            "win32pcmega jan",
            "urlshortner dec",
            "urlshortner sep",
            "as133618",
            "nxdomain",
            "as133775 xiamen",
            "germany unknown",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "resolutions",
            "critical risk",
            "apple phone",
            "unlocker",
            "shell code",
            "installer",
            "ursnif",
            "hacktool",
            "emotet",
            "tracker",
            "chaos",
            "ransomexx",
            "xor ddos",
            "xorddos",
            "mitre attack",
            "parent domain",
            "urls url",
            "siblings",
            "metro",
            "communicating",
            "collection",
            "dropped",
            "skynet",
            "youth",
            "com laude",
            "ltd dba",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "akamaias",
            "digitaloceanasn",
            "csc corporate",
            "pt mora",
            "univjos",
            "etisalat misr",
            "acurix networks",
            "pty ltd",
            "beijing baidu",
            "highly targeted",
            "http",
            "network hijacks",
            "redline stealer",
            "whois sslcert",
            "contacted urls",
            "whois whois",
            "september",
            "hidden cobra",
            "threats",
            "kimsuky",
            "service",
            "read c",
            "create c",
            "write c",
            "regsetvalueexa",
            "mozilla",
            "capture",
            "asnone",
            "domain http",
            "request",
            "malware dns",
            "lookup wannacry",
            "default",
            "ransom",
            "push",
            "playgame",
            "command",
            "email document",
            "exploit domain",
            "owner exploit",
            "kit exploit",
            "source file",
            "hacking tools",
            "hunting macro",
            "malware hosting",
            "memory scanning",
            "yara detections",
            "debug",
            "icmp traffic",
            "pdb path",
            "pe section",
            "low software",
            "packing t1045",
            "ransomware",
            "egregor",
            "find",
            "false",
            "psexec",
            "powershell",
            "qakbot",
            "qbot",
            "icedid"
          ],
          "references": [
            "redhatdelete.com",
            "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
            "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
            "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
            "Trojan-Ransom.Win32.Blocker.jgb Checkin",
            "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "target": null
            },
            {
              "id": "Rostpay",
              "display_name": "Rostpay",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "Chaos (ELF)",
              "display_name": "Chaos (ELF)",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/GameHack",
              "display_name": "TrojanDropper:Win32/GameHack",
              "target": "/malware/TrojanDropper:Win32/GameHack"
            },
            {
              "id": "Win.Ransomware.Locky-7766366-0",
              "display_name": "Win.Ransomware.Locky-7766366-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_pid",
              "display_name": "ALF:E5.SpikeAex.rhh_pid",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 57,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1848,
            "FileHash-SHA1": 1783,
            "FileHash-SHA256": 7170,
            "domain": 1649,
            "hostname": 1191,
            "email": 9,
            "URL": 729,
            "CVE": 2,
            "SSLCertFingerprint": 2,
            "CIDR": 1
          },
          "indicator_count": 14384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "760 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d3acf32e1088e76165a307",
          "name": "Locky: File Deletion targeting incriminating archived files.",
          "description": "",
          "modified": "2024-03-20T12:00:39.809000",
          "created": "2024-02-19T19:33:07.504000",
          "tags": [
            "it consultant",
            "uk collection",
            "dns intel",
            "ips collection",
            "suspicous ip",
            "whois file",
            "cname",
            "record type",
            "ttl value",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "whois lookup",
            "region create",
            "domain",
            "name server",
            "registrant name",
            "technical city",
            "region update",
            "united",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "ck id",
            "cookie",
            "meta",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "dns replication",
            "code",
            "namecheap",
            "registrar abuse",
            "namecheap inc",
            "privacy service",
            "withheld",
            "privacy",
            "dnssec",
            "email",
            "first",
            "bodis",
            "unknown",
            "creation date",
            "search",
            "emails",
            "as397240",
            "date",
            "next",
            "all octoseek",
            "threat roundup",
            "january",
            "june",
            "historical ssl",
            "referrer",
            "contacted",
            "group",
            "execution",
            "phishing",
            "malware",
            "core",
            "malicious",
            "dark power",
            "play ransomware",
            "pe32",
            "intel",
            "ms windows",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "icons library",
            "os2 executable",
            "pe32 linker",
            "gnu linker",
            "compiler",
            "info header",
            "name md5",
            "overlay",
            "passive dns",
            "entries",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "trojan",
            "location united",
            "query",
            "activity dns",
            "observed dns",
            "msie",
            "high",
            "copy",
            "write",
            "win32",
            "hashes",
            "host interaction",
            "sabey type",
            "hallrender",
            "brian sabey",
            "memory pattern",
            "http requests",
            "http method",
            "get response",
            "dns resolutions",
            "ip traffic",
            "domains",
            "mutex",
            "samplepath",
            "created",
            "shell commands",
            "r processes",
            "tree",
            "analyze",
            "hostnames",
            "url https",
            "samples",
            "hostname",
            "pattern urls",
            "memory",
            "pattern",
            "pattern domains",
            "roundup",
            "formbook",
            "mirai",
            "ben c",
            "injection",
            "server",
            "scan endpoints",
            "show",
            "august",
            "bq feb",
            "chrome",
            "precondition",
            "virtool",
            "downloadmr",
            "body",
            "status",
            "servers",
            "record value",
            "name servers",
            "showing",
            "mailrubar",
            "trojanclicker",
            "slcc2",
            "media center",
            "delete c",
            "malware beacon",
            "suspicious",
            "class",
            "internal",
            "local",
            "encrypt",
            "as15169 google",
            "gmt cache",
            "twitter",
            "rostpay",
            "date hash",
            "avast avg",
            "mtb may",
            "susp",
            "cryp",
            "win32upatre may",
            "mtb showing",
            "lowfi",
            "aaaa",
            "win32pcmega jan",
            "urlshortner dec",
            "urlshortner sep",
            "as133618",
            "nxdomain",
            "as133775 xiamen",
            "germany unknown",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "resolutions",
            "critical risk",
            "apple phone",
            "unlocker",
            "shell code",
            "installer",
            "ursnif",
            "hacktool",
            "emotet",
            "tracker",
            "chaos",
            "ransomexx",
            "xor ddos",
            "xorddos",
            "mitre attack",
            "parent domain",
            "urls url",
            "siblings",
            "metro",
            "communicating",
            "collection",
            "dropped",
            "skynet",
            "youth",
            "com laude",
            "ltd dba",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "akamaias",
            "digitaloceanasn",
            "csc corporate",
            "pt mora",
            "univjos",
            "etisalat misr",
            "acurix networks",
            "pty ltd",
            "beijing baidu",
            "highly targeted",
            "http",
            "network hijacks",
            "redline stealer",
            "whois sslcert",
            "contacted urls",
            "whois whois",
            "september",
            "hidden cobra",
            "threats",
            "kimsuky",
            "service",
            "read c",
            "create c",
            "write c",
            "regsetvalueexa",
            "mozilla",
            "capture",
            "asnone",
            "domain http",
            "request",
            "malware dns",
            "lookup wannacry",
            "default",
            "ransom",
            "push",
            "playgame",
            "command",
            "email document",
            "exploit domain",
            "owner exploit",
            "kit exploit",
            "source file",
            "hacking tools",
            "hunting macro",
            "malware hosting",
            "memory scanning",
            "yara detections",
            "debug",
            "icmp traffic",
            "pdb path",
            "pe section",
            "low software",
            "packing t1045",
            "ransomware",
            "egregor",
            "find",
            "false",
            "psexec",
            "powershell",
            "qakbot",
            "qbot",
            "icedid"
          ],
          "references": [
            "redhatdelete.com",
            "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
            "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
            "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
            "Trojan-Ransom.Win32.Blocker.jgb Checkin",
            "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "target": null
            },
            {
              "id": "Rostpay",
              "display_name": "Rostpay",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "Chaos (ELF)",
              "display_name": "Chaos (ELF)",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/GameHack",
              "display_name": "TrojanDropper:Win32/GameHack",
              "target": "/malware/TrojanDropper:Win32/GameHack"
            },
            {
              "id": "Win.Ransomware.Locky-7766366-0",
              "display_name": "Win.Ransomware.Locky-7766366-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_pid",
              "display_name": "ALF:E5.SpikeAex.rhh_pid",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65d34c91868744aa1449fef2",
          "export_count": 64,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1848,
            "FileHash-SHA1": 1783,
            "FileHash-SHA256": 7170,
            "domain": 1649,
            "hostname": 1191,
            "email": 9,
            "URL": 729,
            "CVE": 2,
            "SSLCertFingerprint": 2,
            "CIDR": 1
          },
          "indicator_count": 14384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "760 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d3c31230455f6d8da3a9f0",
          "name": "Locky: File Deletion targeting incriminating archived files II",
          "description": "",
          "modified": "2024-03-20T12:00:39.809000",
          "created": "2024-02-19T21:07:30.887000",
          "tags": [
            "it consultant",
            "uk collection",
            "dns intel",
            "ips collection",
            "suspicous ip",
            "whois file",
            "cname",
            "record type",
            "ttl value",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "whois lookup",
            "region create",
            "domain",
            "name server",
            "registrant name",
            "technical city",
            "region update",
            "united",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "ck id",
            "cookie",
            "meta",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "dns replication",
            "code",
            "namecheap",
            "registrar abuse",
            "namecheap inc",
            "privacy service",
            "withheld",
            "privacy",
            "dnssec",
            "email",
            "first",
            "bodis",
            "unknown",
            "creation date",
            "search",
            "emails",
            "as397240",
            "date",
            "next",
            "all octoseek",
            "threat roundup",
            "january",
            "june",
            "historical ssl",
            "referrer",
            "contacted",
            "group",
            "execution",
            "phishing",
            "malware",
            "core",
            "malicious",
            "dark power",
            "play ransomware",
            "pe32",
            "intel",
            "ms windows",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "icons library",
            "os2 executable",
            "pe32 linker",
            "gnu linker",
            "compiler",
            "info header",
            "name md5",
            "overlay",
            "passive dns",
            "entries",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "trojan",
            "location united",
            "query",
            "activity dns",
            "observed dns",
            "msie",
            "high",
            "copy",
            "write",
            "win32",
            "hashes",
            "host interaction",
            "sabey type",
            "hallrender",
            "brian sabey",
            "memory pattern",
            "http requests",
            "http method",
            "get response",
            "dns resolutions",
            "ip traffic",
            "domains",
            "mutex",
            "samplepath",
            "created",
            "shell commands",
            "r processes",
            "tree",
            "analyze",
            "hostnames",
            "url https",
            "samples",
            "hostname",
            "pattern urls",
            "memory",
            "pattern",
            "pattern domains",
            "roundup",
            "formbook",
            "mirai",
            "ben c",
            "injection",
            "server",
            "scan endpoints",
            "show",
            "august",
            "bq feb",
            "chrome",
            "precondition",
            "virtool",
            "downloadmr",
            "body",
            "status",
            "servers",
            "record value",
            "name servers",
            "showing",
            "mailrubar",
            "trojanclicker",
            "slcc2",
            "media center",
            "delete c",
            "malware beacon",
            "suspicious",
            "class",
            "internal",
            "local",
            "encrypt",
            "as15169 google",
            "gmt cache",
            "twitter",
            "rostpay",
            "date hash",
            "avast avg",
            "mtb may",
            "susp",
            "cryp",
            "win32upatre may",
            "mtb showing",
            "lowfi",
            "aaaa",
            "win32pcmega jan",
            "urlshortner dec",
            "urlshortner sep",
            "as133618",
            "nxdomain",
            "as133775 xiamen",
            "germany unknown",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "resolutions",
            "critical risk",
            "apple phone",
            "unlocker",
            "shell code",
            "installer",
            "ursnif",
            "hacktool",
            "emotet",
            "tracker",
            "chaos",
            "ransomexx",
            "xor ddos",
            "xorddos",
            "mitre attack",
            "parent domain",
            "urls url",
            "siblings",
            "metro",
            "communicating",
            "collection",
            "dropped",
            "skynet",
            "youth",
            "com laude",
            "ltd dba",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "akamaias",
            "digitaloceanasn",
            "csc corporate",
            "pt mora",
            "univjos",
            "etisalat misr",
            "acurix networks",
            "pty ltd",
            "beijing baidu",
            "highly targeted",
            "http",
            "network hijacks",
            "redline stealer",
            "whois sslcert",
            "contacted urls",
            "whois whois",
            "september",
            "hidden cobra",
            "threats",
            "kimsuky",
            "service",
            "read c",
            "create c",
            "write c",
            "regsetvalueexa",
            "mozilla",
            "capture",
            "asnone",
            "domain http",
            "request",
            "malware dns",
            "lookup wannacry",
            "default",
            "ransom",
            "push",
            "playgame",
            "command",
            "email document",
            "exploit domain",
            "owner exploit",
            "kit exploit",
            "source file",
            "hacking tools",
            "hunting macro",
            "malware hosting",
            "memory scanning",
            "yara detections",
            "debug",
            "icmp traffic",
            "pdb path",
            "pe section",
            "low software",
            "packing t1045",
            "ransomware",
            "egregor",
            "find",
            "false",
            "psexec",
            "powershell",
            "qakbot",
            "qbot",
            "icedid"
          ],
          "references": [
            "redhatdelete.com",
            "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
            "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
            "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
            "Trojan-Ransom.Win32.Blocker.jgb Checkin",
            "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
              "target": null
            },
            {
              "id": "Rostpay",
              "display_name": "Rostpay",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "Chaos (ELF)",
              "display_name": "Chaos (ELF)",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/GameHack",
              "display_name": "TrojanDropper:Win32/GameHack",
              "target": "/malware/TrojanDropper:Win32/GameHack"
            },
            {
              "id": "Win.Ransomware.Locky-7766366-0",
              "display_name": "Win.Ransomware.Locky-7766366-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_pid",
              "display_name": "ALF:E5.SpikeAex.rhh_pid",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65d34c8a64436a7aee2e25a1",
          "export_count": 73,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Enqrypted",
            "id": "272105",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1848,
            "FileHash-SHA1": 1783,
            "FileHash-SHA256": 7170,
            "domain": 1649,
            "hostname": 1191,
            "email": 9,
            "URL": 729,
            "CVE": 2,
            "SSLCertFingerprint": 2,
            "CIDR": 1
          },
          "indicator_count": 14384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "760 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708435a5cf4c0504fd0358",
          "name": "consent.youtube.com_09.19.2021_continue=https%3A%2F%2Fwww.youtube.com%2Fsenbrianschatz.pdf",
          "description": "",
          "modified": "2023-12-06T14:24:53.733000",
          "created": "2023-12-06T14:24:53.733000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 761,
            "hostname": 84,
            "domain": 87,
            "URL": 232,
            "CIDR": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 1167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570807033cb904a51db71e1",
          "name": "consent.youtube.com:m? continue=https%3A%2F%2Fwww.youtube.com%2Fu",
          "description": "",
          "modified": "2023-12-06T14:08:48.348000",
          "created": "2023-12-06T14:08:48.348000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 714,
            "hostname": 163,
            "domain": 105,
            "URL": 702,
            "CIDR": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 1689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62323ef2ed65c557feaf2d5c",
          "name": "consent.youtube.com_03.02.2022",
          "description": "",
          "modified": "2022-04-15T00:03:47.669000",
          "created": "2022-03-16T19:48:02.435000",
          "tags": [],
          "references": [
            "consent.youtube.com_03.02.2022.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 90,
            "hostname": 44,
            "domain": 86,
            "URL": 64,
            "CIDR": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 289,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1466 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62323fa5ff34d4011e706547",
          "name": "consent.youtube.com_09.19.2021_continue=https%3A%2F%2Fwww.youtube.com%2Fsenbrianschatz.pdf",
          "description": "",
          "modified": "2022-04-15T00:03:47.669000",
          "created": "2022-03-16T19:51:01.462000",
          "tags": [],
          "references": [
            "consent.youtube.com_09.19.2021_continue=https%3A%2F%2Fwww.youtube.com%2Fsenbrianschatz.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 761,
            "URL": 232,
            "hostname": 84,
            "domain": 87,
            "CIDR": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 1167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1466 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62223d8a5a23add780be8137",
          "name": "consent.youtube.com:m? continue=https%3A%2F%2Fwww.youtube.com%2Fu",
          "description": "",
          "modified": "2022-04-03T00:00:55.161000",
          "created": "2022-03-04T16:25:46.602000",
          "tags": [],
          "references": [
            "consent.youtube.com:m? continue=https%3A%2F%2Fwww.youtube.com%2Fuser%2Fvertexinc%3Fcbrd%3D1&gl=DE&m=0&pc=yt&uxe=2398317 1&hl=de&src=1%22.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 702,
            "hostname": 163,
            "FileHash-SHA256": 714,
            "domain": 105,
            "CIDR": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 1689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "IDS Detection: Worm.Mydoom Checkin User-Agent (explwer) Observed DNS Query to .biz TLD",
        "jcemediabox.css",
        "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a (11.22.25)",
        "stickybar.js.pobrane",
        "djmobilemenu.css",
        "jquery.autocomplete.min.js.pobrane",
        "device-local-**********. remotewd.com",
        "LegalCopyright:Copyright \u00a9 2003-2007 Nullsoft, Inc.",
        "magnific.js.pobrane",
        "Alerts: suricata_alert antivm_generic_diskreg antisandbox_sleep dynamic_function_loading network_http More IP\u2019s Contacted  51.81.61.70 202.12.124.216  17.171.208.6  64.70.19.203  67.195.228.106  103.129.252.44 Less Domains Contacted 21 Domains Contacted sprrmnrhen.biz qhphrpesma.info swwsppwqsh.biz pwpnhsawsn.in hhhmnaprsn.net 126.com 126mx00.mxmail.netease.com yahoo.com mta7.am0.yahoodns.net rrwerqrhma.org",
        "remote.js.pobrane",
        "caption.js.pobrane",
        "WACUP Support Library FileVersion\t3.3.3.0 InternalName\tnde.dll",
        "ad_status.js.pobrane",
        "https://shell-gift.website/sweeps/de/amazon-voucher/question1000-agg/index.html?uclick=qdlpqnvr&uclickhash=qdlpqnvr-qdlpqnvr-pmwj-0-xsi4-hovr-hoi4-9b6533",
        "wacup-1-99-27-21136.exe \u2022 SHA256 4c16b4976cb9efe9db96743620763076890be297f7f5522b640984c28ac61d33",
        "jquery-migrate.min.js.pobrane",
        "extended_layouts.26.css",
        "Yara Detections: , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "offcanvas.26.css",
        "https://hybrid-analysis.com/sample/f6e628e57373bf795bae87c883dcaefdbb720960133edc1adacc6146d10fc88a",
        "www-embed-player.js.pobrane",
        "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
        "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/iocs",
        "Alerts: network_bind persistence_autorun polymorphic procmem_yara static_pe_anomaly",
        "64.70.19.203 is identified in cybersecurity reports & malware analysis as a malicious IP address",
        "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695",
        "template.26.css",
        "font_switcher.26.css",
        "https://pulsedive.com/indicator/?iid=276882&utm_medium=addon&utm_source=popup",
        "api.omgpornpics.com",
        "bootstrap_responsive.26.css",
        "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a",
        "ASN AS3561 Century Link Communications Llc Nameservers: ns5.ncsdi.ws.",
        "style.css",
        "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/summary",
        "64.70.19.203 associated with botnet Command and Control (C&C) servers.",
        "https://tria.ge/251123-ztj19sdm3t/behavioral1",
        "f5Y41t9wqY4.html",
        "consent.youtube.com_03.02.2022.pdf",
        "https://www.exito.com/galaxy-m12-64-gb-negro-samsung-sm-m127fzkkcoo-3016108/p",
        "Modifications by Darren Owen aka DrO \u00a9 2016-2025 OriginalFilename: nde.dll",
        "https://hybrid-analysis.com/sample/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668",
        "map.js.pobrane",
        "finder.css",
        "offcanvas.css",
        "jquery-noconflict.js.pobrane",
        "onion.js.pobrane",
        "djimageslider.css",
        "https://otx.alienvault.com/indicator/domain/sanso-mirai.jp",
        "template_responsive.26.css",
        "main.js.pobrane",
        "consent.youtube.com_09.19.2021_continue=https%3A%2F%2Fwww.youtube.com%2Fsenbrianschatz.pdf",
        "search.js.pobrane",
        "redhatdelete.com",
        "URLscanio, FSio, vT",
        "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
        "animate.ext.css",
        "https://www.virustotal.com/gui/url/e3e416c6754a125f3fa199ab3ce50ab9b26b2074245b14c745498af43fe7f19d/community",
        "Type: CDN Webserver",
        "03.11.14: https://www.virustotal.com/graph/embed/ge2e309eb8bd34fcca56398089b2291058dfe1fca69dc4e5aa66db0365caf735b?theme=dark",
        "embed.js.pobrane",
        "jquery.min.js.pobrane",
        "util.js.pobrane",
        "animations.css",
        "search_impl.js.pobrane",
        "[.]apple.com",
        "common.js.pobrane",
        "magnific-init.js.pobrane",
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside",
        "cast_sender.js.pobrane",
        "jquery.easing.min.js.pobrane",
        "jcemediabox.js.pobrane",
        "embed.html",
        "scripts.js.pobrane",
        "animate.min.css",
        "jquery.ui.core.min.js.pobrane",
        "https://polyswarm.network/scan/results/file/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668",
        "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
        "https://otx.alienvault.com/indicator/ip/210.172.192.15",
        "https://hybrid-analysis.com/sample/ff37a006ed8677bafa412d653ce9adfe84744702f28f7dfe9f5f4ec51b599419/689505a3a647793a0300f73f",
        "js",
        "jquery.cookie.js.pobrane",
        "slider.js.pobrane",
        "Researched: 210.172.192.15 | p192015.mirai.ne.jp  | sanso-mirai.jp",
        "Trojan-Ransom.Win32.Blocker.jgb Checkin",
        "WebSite.ws \u2018Your Internet Address for Life\u2019",
        "Yara Detections: ConventionEngine_Anomaly_Short_TripleChar + RSDS",
        "http://images2.website.ws/kvmlm2/images/13/bg_1bot.png",
        "fontswitcher.js.pobrane",
        "djmegamenu.26.css",
        "InternalName\ttag.dll OriginalFilename: tag.dll ProductName: WACUP TagLib Library ProductVersion: 1.13.1.26",
        "layout.min.js.pobrane",
        "offcanvas.js.pobrane",
        "jquery.djmobilemenu.js.pobrane",
        "https://sms-apple.com/login",
        "consent.youtube.com:m? continue=https%3A%2F%2Fwww.youtube.com%2Fuser%2Fvertexinc%3Fcbrd%3D1&gl=DE&m=0&pc=yt&uxe=2398317 1&hl=de&src=1%22.pdf",
        "jquery.ui.sortable.min.js.pobrane",
        "bootstrap.min.js.pobrane",
        "css",
        "https://hybrid-analysis.com/sample/d30cf86f09e3ab7bb7d0a4ac2608aafb31e07c94fe77f5a264ccdb35fe153c59/689505ded9be5613900509fd",
        "bootstrap.26.css",
        "magnific.css",
        "geometry.js.pobrane",
        "*ccm-command-center.int.m1np.symetra.cloud",
        "jquery.djmegamenu.js.pobrane",
        "pagesettings.js.pobrane",
        "overlay.js.pobrane",
        "https://www.virustotal.com/gui/collection/060884406dcbb77a17da44b51d390058edb73ce1f09674f8dcde393a78916c46/iocs",
        "MyDoom: 64.70.19.203 Command and Control",
        "Monitored Target/s",
        "http://www.mylifelawyer.com/services/denver-affordable-lawyer-child-custody/",
        "Win.Trojan.Ramnit-5482 Yara Detections: Nullsoft_NSIS Alerts: allocates_rwx has_authenticode pe_features",
        "jquery.countTo.js.pobrane",
        "Owner/Provider: Association: AS3561 (large hosting or CDN provider like Level 3/CenturyLink)",
        "https://tria.ge/251125-y86m5ssjfp/behavioral2",
        "content.css",
        "VirusShare_d1ed959764dc880eac854dcf699ad1f0 2021",
        "https://4.img-dpreview.com/files/p/articles/2356747397/samsung_nv24hd_bk.jpeg",
        "Mirai Communication Network Inc. (AS7690) Seto, Japan ASN is a BGP Network",
        "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
        "mailrelay.203.website.ws \u2022 website.ws Files IP Address: 64.70.19.170 Location: United States"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/upatre",
            "Ransom:win32/wannacrypt.a!rsm",
            "Ransom:win32/wannacrypt.h",
            "Telper:hstr:clean:ninite",
            "Rostpay",
            "Tel:trojan:win32/redflare_1",
            "Mitre attack",
            "Alfper",
            "Trojandropper:win32/gamehack",
            "Mirai communications",
            "Simda",
            "Trojan:win32/pariham.a",
            "Tel:hstr:win32/setftahash",
            "!smartinstallmaker_v504",
            "Autorun",
            "Win.trojan.crypt-142",
            "Virtool",
            "#lowfi:vbexpensiveloop",
            "Trojan:win32/mydoom",
            "Gc",
            "Trojan-ransom.win32.blocker.jgb checkin",
            "Win.trojan.nmzbaak8fvob-10038731-0",
            "Telper:cert:softwarebundler:win32/bunpredelt",
            "Alf:e5.spikeaex.rhh_pid",
            "Worm:win32/mofksys.rnd!mtb",
            "Win.ransomware.locky-7766366-0",
            "Win.malware.pits",
            "Backdoor:win32/fynloski",
            "Trojanspy:msil/omaneat.a",
            "Emotet",
            "Chaos (elf)",
            "Win.trojan.ramnit-5482",
            "Suppobox",
            "Trojandownloader:win32/banload",
            "Win.trojan.14278494-1",
            "Mirai",
            "Win.malware.cerbu-9952502-0",
            "Downloader.generic7.atss",
            "#lowfi:sigattr:urlshortner",
            "Win.malware.pits-10035540-0"
          ],
          "industries": [
            "Technology",
            "Government",
            "Hospitality",
            "Retail",
            "Education",
            "Finance",
            "Transportation",
            "Telecommunications",
            "Healthcare"
          ],
          "unique_indicators": 55337
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/google.com",
    "whois": "http://whois.domaintools.com/google.com",
    "domain": "google.com",
    "hostname": "accounts.google.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 16,
  "pulses": [
    {
      "id": "69ccd2f7984fad6feebb4ca4",
      "name": "VirusTotal report\n                    for index.html",
      "description": "The full text of the full report-to-gws, which was published on 1 April 2026, has been published online by the Csp website, following a request from the BBC>pretext .",
      "modified": "2026-04-01T08:44:36.825000",
      "created": "2026-04-01T08:10:31.621000",
      "tags": [
        "self",
        "downlink rtt",
        "html document",
        "ascii text",
        "crlf line",
        "windows",
        "linux",
        "build web",
        "html",
        "javascript",
        "https",
        "acceptencoding",
        "cookie",
        "dynamic",
        "authorization",
        "contentmd5",
        "wp engine",
        "xmsedgeref ref",
        "bl2edge1520 ref",
        "expires sun",
        "gmt date",
        "gmt xcache",
        "tcphit",
        "gmt etag",
        "b8glwd",
        "afeap",
        "bmxagc",
        "e5bfse",
        "bgs6mb",
        "bjwmce",
        "ciztgb",
        "kqhykb",
        "cxxawb",
        "fevhcf",
        "code",
        "server",
        "registrar abuse",
        "admin country",
        "expiration date",
        "registry domain",
        "registrar iana",
        "creation date",
        "admin city",
        "redmond tech",
        "samesitelax",
        "path",
        "httponly",
        "secure",
        "priorityhigh",
        "gmt contenttype",
        "contentlength",
        "connection",
        "cfray",
        "accept",
        "anycast",
        "wifi display",
        "android",
        "hdtv",
        "anycast og",
        "anything",
        "big screen",
        "mobileoptimized",
        "try shopify",
        "platform",
        "businesses",
        "shopify fb",
        "shopify og",
        "snapchat",
        "chat",
        "snaps",
        "a snap",
        "utc google",
        "adobe dynamic",
        "tag management",
        "amazon",
        "utc amazon",
        "utc facebook",
        "connect na",
        "analytics na",
        "tag manager",
        "gdlname",
        "miss",
        "drupal",
        "miss xtimer",
        "ve9 xcache",
        "miss date",
        "gmt link",
        "build",
        "home og",
        "cloudfront",
        "iad6",
        "kb body",
        "sha256",
        "aspen",
        "aspen one",
        "return",
        "transformed og",
        "aioseo",
        "site kit",
        "google",
        "file type",
        "name file",
        "html internet",
        "unicode text",
        "utf8 text"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1542",
          "name": "Pre-OS Boot",
          "display_name": "T1542 - Pre-OS Boot"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 238,
        "URL": 367,
        "domain": 80,
        "hostname": 155,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 105,
        "email": 5,
        "IPv4": 40,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 1109,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69228447b9c71795633314df",
      "name": "Keep Corrupt - University of Alberta Incidents continue to escalate - 02.16.26",
      "description": "Recovered accounts that have been used & abused - courtesy of decisions by non-technical leadership = accounts for UAlberta students -> PW manager made inaccessible (tied to UAlberta account) during a Data-Breach.\nWhen PW manager & Accounts returned, was populated by these (many = fraudulent; some appear to be abuse of legitimate services, while others do not, yet don't know function or origin)\n\nNot representative of OG PW manager. Many (most) accts. used/abused (on-going). \n\nDon't have a backup of original = hard to compare. Don't quite know what the majority of these companies etc. are for and/or do exactly. Putting them together as they roll-in.\nCan't turn them off in most cases - I don't have access to the U of A accounts these originate from and/or original recovery methods. \n\n2 more batches to add to this pulse (Need to add into VT) 02.16.26\n\nCountries listed are where 2 victims (UAlberta Graduates) have citizenship or some tie with.",
      "modified": "2026-03-04T21:04:10.482000",
      "created": "2025-11-23T03:49:27.649000",
      "tags": [
        "geoip",
        "as54113",
        "fastly",
        "as20940",
        "as15169",
        "google",
        "as214401",
        "maincubesas",
        "gmbh",
        "apache geoip",
        "facebook",
        "UAlberta",
        "AHS",
        "Treaty 8",
        "GoA",
        "Alberta",
        "Edmonton",
        "YEG"
      ],
      "references": [
        "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a",
        "URLscanio, FSio, vT",
        "03.11.14: https://www.virustotal.com/graph/embed/ge2e309eb8bd34fcca56398089b2291058dfe1fca69dc4e5aa66db0365caf735b?theme=dark",
        "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/summary",
        "https://www.virustotal.com/gui/collection/6a41ae1cf2d3d51fedd2393d893c3b26ed0352dde2e0851d03f0bae9aaa69ae1/iocs",
        "https://viz.greynoise.io/ip/analysis/3cf1334a-df9d-448f-8145-d5fe67637c1a (11.22.25)"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Cura\u00e7ao",
        "Guatemala",
        "Sint Maarten (Dutch part)",
        "Tanzania, United Republic of",
        "Barbados",
        "United States of America",
        "Bahamas",
        "Anguilla",
        "Canada",
        "Saint Vincent and the Grenadines",
        "United Kingdom of Great Britain and Northern Ireland",
        "Kenya",
        "France",
        "Aruba",
        "Mexico",
        "Poland",
        "Costa Rica",
        "Ireland",
        "Trinidad and Tobago",
        "Netherlands",
        "Slovakia",
        "Spain",
        "Philippines"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government",
        "Technology",
        "Telecommunications",
        "Education",
        "Healthcare",
        "Finance",
        "Retail",
        "Hospitality",
        "Transportation"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CIDR": 47,
        "FileHash-MD5": 32,
        "FileHash-SHA1": 12,
        "FileHash-SHA256": 1047,
        "URL": 4006,
        "domain": 2126,
        "email": 412,
        "hostname": 2122,
        "CVE": 1
      },
      "indicator_count": 9805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 134,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6953faf8bc5d0bacd899eb5a",
      "name": "Virus Share - Apple monitors targeted Apple users via Apple devices",
      "description": "Malware packed! Virus Share Apple monitors targeted Apple users via Apple devices. Adversaries gain access to select users maintaining full CnC. \nDevices are modified , security disabled, adversaries exploit privileges collecting email, cnc of app store , browsers, WebKit, cameras, conversations, streaming cloud accounts , texts , etc. In this example keylogger installed, email collection enabled. Device able to connect to random devices or soundbars w/o WiFi or Bluetooth being enabled. Hight probability (in a notable example)  devices may not have connected to client ISP / NSP, cell towers due to a deauthor, signal jamming ,remotely unlocked devices, zombie devices.",
      "modified": "2026-01-29T15:02:39.082000",
      "created": "2025-12-30T16:16:56.677000",
      "tags": [
        "yara detections",
        "wacup support",
        "taglib library",
        "av detections",
        "library exe",
        "internalname",
        "nullsoft",
        "darren owen",
        "a domains",
        "musicbrainz",
        "script urls",
        "germany",
        "ip address",
        "title",
        "paris",
        "dnssec",
        "name robert",
        "kaye name",
        "org metabrainz",
        "foundation inc",
        "south higuera",
        "luis obispo",
        "country us",
        "rob@metabrainz.org",
        "robert kaye",
        "san luis obispo",
        "united",
        "aaaa",
        "servers",
        "moved",
        "certificate",
        "urls",
        "win32mydoom dec",
        "trojan",
        "expiration date",
        "dynamicloader",
        "crlf line",
        "unicode text",
        "utf8",
        "ee fc",
        "ff d5",
        "yara rule",
        "ascii text",
        "f0 ff",
        "eb e1",
        "unknown",
        "write",
        "malware",
        "autorun",
        "suspicious",
        "backdoor",
        "found",
        "gmt connection",
        "control",
        "twitter",
        "verisign",
        "write c",
        "show",
        "time stamping",
        "read c",
        "search",
        "class",
        "present",
        "passive dns",
        "ipv4 add",
        "pulse pulses",
        "files",
        "script script",
        "a li",
        "div div",
        "a div",
        "content type",
        "script",
        "ul div",
        "life",
        "meta",
        "agent",
        "stack",
        "present oct",
        "gmt content",
        "type",
        "asn as3561",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "as15169",
        "virustotal",
        "mcafee",
        "drweb",
        "vipre",
        "downloader",
        "panda",
        "local",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "defense evasion",
        "spawns",
        "t1480 execution",
        "api call",
        "monitored target",
        "united states",
        "present dec",
        "lowfi",
        "trojanspy",
        "win32upatre dec",
        "status",
        "present nov",
        "worm",
        "worm",
        "network",
        "zombie devices",
        "prefetch8",
        "localappdata",
        "prefetch1",
        "command decode",
        "programfiles",
        "edge",
        "show process",
        "show technique",
        "mitre att",
        "ck matrix",
        "process",
        "potential ip",
        "network traffic",
        "t1071",
        "win64",
        "general",
        "path",
        "analysis tip",
        "click",
        "process details"
      ],
      "references": [
        "VirusShare_d1ed959764dc880eac854dcf699ad1f0 2021",
        "[.]apple.com",
        "Yara Detections: ConventionEngine_Anomaly_Short_TripleChar + RSDS",
        "WACUP Support Library FileVersion\t3.3.3.0 InternalName\tnde.dll",
        "LegalCopyright:Copyright \u00a9 2003-2007 Nullsoft, Inc.",
        "Modifications by Darren Owen aka DrO \u00a9 2016-2025 OriginalFilename: nde.dll",
        "wacup-1-99-27-21136.exe \u2022 SHA256 4c16b4976cb9efe9db96743620763076890be297f7f5522b640984c28ac61d33",
        "InternalName\ttag.dll OriginalFilename: tag.dll ProductName: WACUP TagLib Library ProductVersion: 1.13.1.26",
        "IDS Detection: Worm.Mydoom Checkin User-Agent (explwer) Observed DNS Query to .biz TLD",
        "Alerts: network_bind persistence_autorun polymorphic procmem_yara static_pe_anomaly",
        "Alerts: suricata_alert antivm_generic_diskreg antisandbox_sleep dynamic_function_loading network_http More IP\u2019s Contacted  51.81.61.70 202.12.124.216  17.171.208.6  64.70.19.203  67.195.228.106  103.129.252.44 Less Domains Contacted 21 Domains Contacted sprrmnrhen.biz qhphrpesma.info swwsppwqsh.biz pwpnhsawsn.in hhhmnaprsn.net 126.com 126mx00.mxmail.netease.com yahoo.com mta7.am0.yahoodns.net rrwerqrhma.org",
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside",
        "Yara Detections: , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Win.Trojan.Ramnit-5482 Yara Detections: Nullsoft_NSIS Alerts: allocates_rwx has_authenticode pe_features",
        "mailrelay.203.website.ws \u2022 website.ws Files IP Address: 64.70.19.170 Location: United States",
        "ASN AS3561 Century Link Communications Llc Nameservers: ns5.ncsdi.ws.",
        "WebSite.ws \u2018Your Internet Address for Life\u2019",
        "http://images2.website.ws/kvmlm2/images/13/bg_1bot.png",
        "MyDoom: 64.70.19.203 Command and Control",
        "Owner/Provider: Association: AS3561 (large hosting or CDN provider like Level 3/CenturyLink)",
        "Type: CDN Webserver",
        "64.70.19.203 is identified in cybersecurity reports & malware analysis as a malicious IP address",
        "64.70.19.203 associated with botnet Command and Control (C&C) servers."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "!SmartInstallMaker_v504",
          "display_name": "!SmartInstallMaker_v504",
          "target": null
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "Trojan:Win32/Pariham.A",
          "display_name": "Trojan:Win32/Pariham.A",
          "target": "/malware/Trojan:Win32/Pariham.A"
        },
        {
          "id": "Win.Malware.Cerbu-9952502-0",
          "display_name": "Win.Malware.Cerbu-9952502-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Ramnit-5482",
          "display_name": "Win.Trojan.Ramnit-5482",
          "target": null
        },
        {
          "id": "Autorun",
          "display_name": "Autorun",
          "target": null
        },
        {
          "id": "Downloader.Generic7.ATSS",
          "display_name": "Downloader.Generic7.ATSS",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Banload",
          "display_name": "TrojanDownloader:Win32/Banload",
          "target": "/malware/TrojanDownloader:Win32/Banload"
        },
        {
          "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
          "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Trojan:Win32/Upatre",
          "display_name": "Trojan:Win32/Upatre",
          "target": "/malware/Trojan:Win32/Upatre"
        },
        {
          "id": "Win.Malware.Pits",
          "display_name": "Win.Malware.Pits",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski",
          "display_name": "Backdoor:Win32/Fynloski",
          "target": "/malware/Backdoor:Win32/Fynloski"
        },
        {
          "id": "#LowFI:VBExpensiveLoop",
          "display_name": "#LowFI:VBExpensiveLoop",
          "target": null
        },
        {
          "id": "TrojanSpy:MSIL/Omaneat.A",
          "display_name": "TrojanSpy:MSIL/Omaneat.A",
          "target": "/malware/TrojanSpy:MSIL/Omaneat.A"
        },
        {
          "id": "Win.Trojan.Nmzbaak8fvob-10038731-0",
          "display_name": "Win.Trojan.Nmzbaak8fvob-10038731-0",
          "target": null
        },
        {
          "id": "TEL:Trojan:Win32/REDFLARE_1",
          "display_name": "TEL:Trojan:Win32/REDFLARE_1",
          "target": null
        },
        {
          "id": "TEL:HSTR:Win32/SetFTAHash",
          "display_name": "TEL:HSTR:Win32/SetFTAHash",
          "target": null
        },
        {
          "id": "Win.Malware.Pits-10035540-0",
          "display_name": "Win.Malware.Pits-10035540-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3861,
        "URL": 296,
        "hostname": 213,
        "FileHash-MD5": 971,
        "FileHash-SHA1": 864,
        "email": 16,
        "domain": 53,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 6276,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "80 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69238035a56276b95c898fc8",
      "name": "Google Malcert - 11.25.25",
      "description": "https://tria.ge/251123-ztj19sdm3t/behavioral1\n\nd6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668\ndistrusted_certs\nResearchers at the University of California at Berkeley, in the US, have decoded a series of key information about Google users, which they hope will help them to find out about the firm's products and services.",
      "modified": "2025-12-23T21:05:26.373000",
      "created": "2025-11-23T21:44:21.109000",
      "tags": [
        "kqhykb",
        "snun3",
        "yv5bee",
        "remote address",
        "in a",
        "nj1rfe",
        "pphkqf",
        "ciztgb",
        "sdcwhb",
        "leikze",
        "accept",
        "please",
        "javascript",
        "triage",
        "malware",
        "analysis",
        "report",
        "reported",
        "analyze",
        "sandbox",
        "monitor",
        "sample",
        "resource",
        "general",
        "config",
        "signatures",
        "processes",
        "network",
        "replay",
        "copy",
        "target",
        "score"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/060884406dcbb77a17da44b51d390058edb73ce1f09674f8dcde393a78916c46/iocs",
        "https://tria.ge/251123-ztj19sdm3t/behavioral1",
        "https://tria.ge/251125-y86m5ssjfp/behavioral2",
        "https://hybrid-analysis.com/sample/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668",
        "https://polyswarm.network/scan/results/file/d6dc61627fef1444214469b7f2d164301aa24d8b8dd878edfc81dd28afcc4668"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 29,
        "FileHash-SHA1": 29,
        "FileHash-SHA256": 30,
        "URL": 58,
        "domain": 4,
        "hostname": 15,
        "CVE": 1
      },
      "indicator_count": 166,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "117 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68958d96a43dd0d3b5a65220",
      "name": "Mirai Communication Networks Inc",
      "description": "BGP Mirai Communication Networks Inc. May be used for Red Hat activities considered enterprise open source solutions. Used for adversarial motives. Abuse.\nResearched a device-local-**********.remotewd.com found in last residential community a monitored target lived.",
      "modified": "2025-09-07T05:03:49.633000",
      "created": "2025-08-08T05:39:34.315000",
      "tags": [
        "united",
        "unknown ns",
        "moved",
        "passive dns",
        "ip address",
        "cloudfront x",
        "hio50 c1",
        "a domains",
        "domains",
        "meta",
        "mirai",
        "apache",
        "url hostname",
        "server response",
        "google safe",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "command",
        "found",
        "mitre att",
        "ck techniques",
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "size",
        "null",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "show technique",
        "ck matrix",
        "adversaries",
        "general",
        "starfield",
        "iframe",
        "onload",
        "status",
        "urls",
        "domain",
        "name servers",
        "hostname",
        "files",
        "files ip",
        "certificate",
        "urls show",
        "results aug",
        "entries",
        "show process",
        "utf8",
        "crlf line",
        "network traffic",
        "title error",
        "next associated",
        "body doctype",
        "html public",
        "w3cdtd html",
        "html head",
        "meta http",
        "equiv content",
        "win32",
        "trojan",
        "servers",
        "search",
        "whois show",
        "record value",
        "emails",
        "name legal",
        "department name",
        "address po",
        "city seattle",
        "present oct",
        "present jul",
        "present dec",
        "present aug",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "safe browsing",
        "external",
        "data upload",
        "extraction",
        "include review",
        "exclude sugges",
        "uny inuuue",
        "find s",
        "extr",
        "typ dom",
        "failed",
        "extri data",
        "mirai meta",
        "japan unknown",
        "miraipcok meta",
        "overview ip",
        "address",
        "location united",
        "asn as15169",
        "nameservers",
        "less whois",
        "registrar",
        "overview domain",
        "address domain",
        "ip whois",
        "title",
        "create c",
        "read c",
        "delete",
        "write",
        "medium",
        "create",
        "showing",
        "rgba",
        "next",
        "dock",
        "execution",
        "malware",
        "sqlite rollback",
        "jfif",
        "journal",
        "regsetvalueexa",
        "ascii",
        "regdword",
        "baidu",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "redacted for",
        "unknown aaaa",
        "hostname add",
        "url analysis",
        "encrypt",
        "date",
        "germany unknown",
        "ascio",
        "creation date",
        "alfper",
        "ipv4 add",
        "reverse dns",
        "mozilla",
        "set spray",
        "pty ltd",
        "date checked",
        "present jun",
        "present nov",
        "present may",
        "present mar",
        "present sep",
        "present jan",
        "for privacy",
        "lngen",
        "ransom",
        "virtool",
        "exploit",
        "as133618",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "related pulses",
        "asn as133618",
        "whois registrar",
        "ietfdtd html",
        "gmt server",
        "debian",
        "dynamicloader",
        "unknown",
        "feat",
        "query",
        "installer",
        "results oct",
        "results jan",
        "aaaa",
        "tlsv1",
        "stcalifornia",
        "lmountain view",
        "ogoogle llc",
        "ogoogle trust",
        "cngts ca",
        "lowfi",
        "urlshortner aug",
        "urlshortner jul",
        "urlshortner",
        "write c",
        "high",
        "et exploit",
        "probe ms17010",
        "f codeoverlap",
        "copy",
        "contacted",
        "w3wwhb",
        "svwjh5dd u",
        "uv5b usvwu",
        "f us3v9",
        "cu codeoverlap",
        "filehash",
        "sha256 add",
        "monitored target",
        "sloffeefoundry.com",
        "apple",
        "samsung",
        "galaxy",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "persistence",
        "edge",
        "bing",
        "racism",
        "amazon music",
        "ios",
        "twitter",
        "googleapis",
        "denver"
      ],
      "references": [
        "Researched: 210.172.192.15 | p192015.mirai.ne.jp  | sanso-mirai.jp",
        "Mirai Communication Network Inc. (AS7690) Seto, Japan ASN is a BGP Network",
        "*ccm-command-center.int.m1np.symetra.cloud",
        "Monitored Target/s",
        "https://hybrid-analysis.com/sample/ff37a006ed8677bafa412d653ce9adfe84744702f28f7dfe9f5f4ec51b599419/689505a3a647793a0300f73f",
        "https://hybrid-analysis.com/sample/d30cf86f09e3ab7bb7d0a4ac2608aafb31e07c94fe77f5a264ccdb35fe153c59/689505ded9be5613900509fd",
        "https://hybrid-analysis.com/sample/f6e628e57373bf795bae87c883dcaefdbb720960133edc1adacc6146d10fc88a",
        "https://otx.alienvault.com/indicator/ip/210.172.192.15",
        "https://otx.alienvault.com/indicator/domain/sanso-mirai.jp",
        "device-local-**********. remotewd.com",
        "https://sms-apple.com/login",
        "https://www.exito.com/galaxy-m12-64-gb-negro-samsung-sm-m127fzkkcoo-3016108/p",
        "https://4.img-dpreview.com/files/p/articles/2356747397/samsung_nv24hd_bk.jpeg",
        "https://shell-gift.website/sweeps/de/amazon-voucher/question1000-agg/index.html?uclick=qdlpqnvr&uclickhash=qdlpqnvr-qdlpqnvr-pmwj-0-xsi4-hovr-hoi4-9b6533",
        "api.omgpornpics.com",
        "http://www.mylifelawyer.com/services/denver-affordable-lawyer-child-custody/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Crypt-142",
          "display_name": "Win.Trojan.Crypt-142",
          "target": null
        },
        {
          "id": "#Lowfi:SIGATTR:URLShortner",
          "display_name": "#Lowfi:SIGATTR:URLShortner",
          "target": null
        },
        {
          "id": "Win.Trojan.14278494-1",
          "display_name": "Win.Trojan.14278494-1",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ransom:Win32/WannaCrypt.H",
          "display_name": "ransom:Win32/WannaCrypt.H",
          "target": "/malware/ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Ransom:Win32/WannaCrypt.H",
          "display_name": "Ransom:Win32/WannaCrypt.H",
          "target": "/malware/Ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Mirai Communications",
          "display_name": "Mirai Communications",
          "target": null
        },
        {
          "id": "Alfper",
          "display_name": "Alfper",
          "target": null
        },
        {
          "id": "telper:HSTR:CLEAN:Ninite",
          "display_name": "telper:HSTR:CLEAN:Ninite",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        }
      ],
      "industries": [
        "Technology",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8962,
        "domain": 1671,
        "hostname": 2125,
        "FileHash-SHA256": 2031,
        "FileHash-MD5": 718,
        "FileHash-SHA1": 523,
        "SSLCertFingerprint": 12,
        "email": 7,
        "CVE": 1
      },
      "indicator_count": 16050,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "224 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "684c65464466dd19b089f325",
      "name": "Zesp\u00f3\u0142 Profilaktyki i Rehabilitacji w Janowicach Wielkich - YouTube",
      "description": "If d=void 0===c,w(\"trustedResourceUrl\",d: \"Trusted resourceUrl,\" thend=c.src,d, c.js, then d:",
      "modified": "2025-06-13T17:56:28.689000",
      "created": "2025-06-13T17:52:06.399000",
      "tags": [
        "rehabilitacji w",
        "youtube tv",
        "dami jelenia",
        "tv dami",
        "jelenia gra",
        "zakupy wycz",
        "jeli",
        "nie korzystasz",
        "filmy",
        "aby tego",
        "copyright",
        "closure library",
        "argument",
        "ifunction",
        "error",
        "null",
        "type",
        "cast",
        "webchannel",
        "su2028u2029",
        "chrome",
        "xmlhttp",
        "kkvoid",
        "remotecontrol",
        "android",
        "unknown",
        "screen",
        "desktop",
        "function",
        "string",
        "array",
        "number",
        "vfunction",
        "f8192",
        "n432",
        "true",
        "j2048",
        "this",
        "window",
        "void",
        "date",
        "pokau017c",
        "pytfunction",
        "fe8function",
        "qgzfunction",
        "afunction",
        "hb28",
        "r150",
        "promise",
        "bigint",
        "post",
        "edge",
        "swhealthlog",
        "symbol",
        "trident",
        "infinity",
        "embed",
        "webkitkeyframes",
        "zoomin",
        "zoominx",
        "zoomoutx",
        "zoominy",
        "zoomouty",
        "2000px",
        "90deg",
        "20px",
        "30deg",
        "30px",
        "10px",
        "10deg",
        "3deg",
        "5deg",
        "djmegamenu",
        "use license",
        "tabindex",
        "menu",
        "close",
        "msie",
        "beforechange",
        "imagehassize",
        "buildcontrols",
        "magnific popup",
        "dmitry semenov",
        "http",
        "beforeclose",
        "afterclose",
        "open",
        "next",
        "open source",
        "bsd license",
        "george mcginley",
        "smith",
        "djimageslider",
        "subpackage",
        "webkit",
        "khtml",
        "icab",
        "countto",
        "callback",
        "handler",
        "object",
        "typeof",
        "method",
        "gnugplv2",
        "website",
        "set module",
        "height script",
        "regexp",
        "screenheight",
        "highcontrast2",
        "highcontrast3",
        "highcontrast",
        "wide",
        "night",
        "body",
        "normalbutton",
        "cookie plugin",
        "https",
        "klaus hartl",
        "mit license",
        "register",
        "nodecommonjs",
        "factory",
        "jquery",
        "write",
        "sticky bar",
        "stickybar",
        "count",
        "offcanvas",
        "html",
        "noscroll",
        "offcanvas var",
        "toggle nav",
        "click jquery",
        "ajax",
        "autocomplete",
        "tomas kirda",
        "typeof define",
        "esc27",
        "tab9",
        "return13",
        "left37",
        "up38",
        "twitter",
        "custom version",
        "joomla",
        "rolemenu",
        "boolean",
        "get adobe",
        "flash player",
        "title",
        "text",
        "typeof data",
        "typeof s",
        "accept",
        "width",
        "foundation",
        "backspace8",
        "comma188",
        "delete46",
        "down40",
        "end35",
        "enter13",
        "escape27",
        "value",
        "migrate",
        "backcompat",
        "quirks mode",
        "typeof f",
        "xtablet768",
        "document",
        "ui sortable",
        "leftright",
        "gnu general",
        "public license",
        "dddddd",
        "ffffcc",
        "eeeeee",
        "verdana",
        "geneva",
        "arial",
        "helvetica",
        "f0f0f0",
        "sans",
        "charset",
        "utf8",
        "fontawesome",
        "typeof b",
        "pseudo",
        "child",
        "sufeffxa0",
        "class",
        "attr",
        "general slider",
        "slide",
        "rgba",
        "navigation",
        "15deg",
        "300px",
        "20deg",
        "transition",
        "scale",
        "baskerville",
        "main image",
        "bdbdbd",
        "f3f3f3",
        "remove",
        "fontface",
        "woff2",
        "u0131",
        "u01520153",
        "u02bb02bc",
        "u02c6",
        "u02da",
        "u02dc",
        "u0304",
        "dirrtl",
        "msviewport",
        "href",
        "span",
        "legend",
        "halflings",
        "fieldset",
        "typeimage",
        "f2f2f2",
        "d9edf7",
        "dff0d8",
        "f2dede",
        "thead",
        "tbody",
        "tahoma",
        "00a0",
        "video",
        "script",
        "2500",
        "xnew ita",
        "dnew jta",
        "dataset",
        "orfunction",
        "prfunction",
        "nsafunction",
        "xsafunction",
        "vrfunction",
        "cakes",
        "ovbfunction",
        "pvbfunction",
        "rvbfunction",
        "qvbfunction",
        "tvbfunction",
        "uvbfunction",
        "vvbclass",
        "xvbclass",
        "yvbclass",
        "svbclass",
        "lvafunction",
        "ggfunction",
        "mvafunction",
        "ovafunction",
        "pvafunction",
        "uvafunction",
        "tvafunction",
        "qvafunction",
        "vvafunction",
        "nvaclass",
        "dark",
        "vector",
        "yy49",
        "raster",
        "roboto",
        "new tk",
        "qael",
        "przechyl",
        "mars",
        "mercury",
        "venus",
        "pluto",
        "titan",
        "weakset",
        "wfclass",
        "googlelayer",
        "uint8array",
        "weakmap",
        "5001",
        "mouseevent",
        "webassembly",
        "180180",
        "9090",
        "google maps",
        "javascript api",
        "internal",
        "small",
        "lightrail",
        "false",
        "february",
        "light",
        "hybrid",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "gc"
      ],
      "references": [
        "embed.html",
        "ad_status.js.pobrane",
        "f5Y41t9wqY4.html",
        "cast_sender.js.pobrane",
        "remote.js.pobrane",
        "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
        "embed.js.pobrane",
        "www-embed-player.js.pobrane",
        "animate.ext.css",
        "animate.min.css",
        "jquery.djmegamenu.js.pobrane",
        "jquery.djmobilemenu.js.pobrane",
        "magnific.js.pobrane",
        "jquery.easing.min.js.pobrane",
        "slider.js.pobrane",
        "jquery.countTo.js.pobrane",
        "scripts.js.pobrane",
        "magnific-init.js.pobrane",
        "pagesettings.js.pobrane",
        "jquery.cookie.js.pobrane",
        "stickybar.js.pobrane",
        "fontswitcher.js.pobrane",
        "offcanvas.js.pobrane",
        "jquery.autocomplete.min.js.pobrane",
        "bootstrap.min.js.pobrane",
        "jcemediabox.js.pobrane",
        "jquery.ui.core.min.js.pobrane",
        "jquery-migrate.min.js.pobrane",
        "layout.min.js.pobrane",
        "jquery.ui.sortable.min.js.pobrane",
        "caption.js.pobrane",
        "finder.css",
        "jquery-noconflict.js.pobrane",
        "djmegamenu.26.css",
        "animations.css",
        "djmobilemenu.css",
        "jquery.min.js.pobrane",
        "djimageslider.css",
        "offcanvas.css",
        "magnific.css",
        "font_switcher.26.css",
        "css",
        "template_responsive.26.css",
        "offcanvas.26.css",
        "bootstrap_responsive.26.css",
        "extended_layouts.26.css",
        "style.css",
        "content.css",
        "template.26.css",
        "bootstrap.26.css",
        "jcemediabox.css",
        "js",
        "onion.js.pobrane",
        "search_impl.js.pobrane",
        "overlay.js.pobrane",
        "map.js.pobrane",
        "util.js.pobrane",
        "search.js.pobrane",
        "common.js.pobrane",
        "geometry.js.pobrane",
        "main.js.pobrane"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Gc",
          "display_name": "Gc",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2779,
        "hostname": 661,
        "domain": 684,
        "email": 4,
        "FileHash-MD5": 1,
        "FileHash-SHA256": 689
      },
      "indicator_count": 4818,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "310 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67d0fc5ede5b93d17a15a654",
      "name": "Threat Intelligence - Pulsedive - Login to XUSOM GMAIL",
      "description": "Google.com has a security certificate that allows it to access all its users' data, even if they have no access to it, and the full set of security details that can be accessed.\n\nYet another Impacted MD School - this is just the google login page....\nData from Pulsedive Browser Extension",
      "modified": "2025-04-11T03:03:55.658000",
      "created": "2025-03-12T03:15:42.664000",
      "tags": [
        "gmail login",
        "xusom",
        "ssl certificate",
        "threat intelligence",
        "feed",
        "ioc",
        "change theme",
        "contact us",
        "intelligence",
        "threats api",
        "analyze api",
        "overview",
        "threats explore",
        "rate limits",
        "stixtaxii",
        "bulk export",
        "Cryptojacking",
        "JS Crypto Miner",
        "Malware (General)",
        "Phishing (General)",
        "Simda (Malware)",
        "Spamming (General)",
        "SSH Brute Force (General)",
        "Suppobox (Malware)",
        "TOR Proxy (Tool)",
        "Pulsedive"
      ],
      "references": [
        "https://pulsedive.com/indicator/?iid=276882&utm_medium=addon&utm_source=popup",
        "",
        "https://www.virustotal.com/gui/url/e3e416c6754a125f3fa199ab3ce50ab9b26b2074245b14c745498af43fe7f19d/community"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Aruba",
        "Panama",
        "Canada"
      ],
      "malware_families": [
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Suppobox",
          "display_name": "Suppobox",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [
        "Education",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 71,
        "hostname": 45,
        "URL": 2
      },
      "indicator_count": 118,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 130,
      "modified_text": "373 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d34c8a64436a7aee2e25a1",
      "name": "Locky: File Deletion targeting incriminating archived files.",
      "description": "redhatdelete.com : Adversaries are deleting files in bulk  from Virustotal, otx AlienVault, WebArchive, Perma.cc Urlscan.io, Archive.Today, Archive.ph, iCloud, apple data, photo deletion.\nVarious ransomware used. iOS service modified, cloud encrypted by adversary. Indicator point to a target with a zombie device. An iPhone and potentially other devices were targeted in a specific attack. | Locky Ransomware is a piece of malware that encrypts important files on your device, rendering them inaccessible and unusable.",
      "modified": "2024-03-20T12:00:39.809000",
      "created": "2024-02-19T12:41:46.707000",
      "tags": [
        "it consultant",
        "uk collection",
        "dns intel",
        "ips collection",
        "suspicous ip",
        "whois file",
        "cname",
        "record type",
        "ttl value",
        "algorithm",
        "v3 serial",
        "number",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "whois lookup",
        "region create",
        "domain",
        "name server",
        "registrant name",
        "technical city",
        "region update",
        "united",
        "command decode",
        "mitre att",
        "suricata ipv4",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "ck id",
        "cookie",
        "meta",
        "february",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "dns replication",
        "code",
        "namecheap",
        "registrar abuse",
        "namecheap inc",
        "privacy service",
        "withheld",
        "privacy",
        "dnssec",
        "email",
        "first",
        "bodis",
        "unknown",
        "creation date",
        "search",
        "emails",
        "as397240",
        "date",
        "next",
        "all octoseek",
        "threat roundup",
        "january",
        "june",
        "historical ssl",
        "referrer",
        "contacted",
        "group",
        "execution",
        "phishing",
        "malware",
        "core",
        "malicious",
        "dark power",
        "play ransomware",
        "pe32",
        "intel",
        "ms windows",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "icons library",
        "os2 executable",
        "pe32 linker",
        "gnu linker",
        "compiler",
        "info header",
        "name md5",
        "overlay",
        "passive dns",
        "entries",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "trojan",
        "location united",
        "query",
        "activity dns",
        "observed dns",
        "msie",
        "high",
        "copy",
        "write",
        "win32",
        "hashes",
        "host interaction",
        "sabey type",
        "hallrender",
        "brian sabey",
        "memory pattern",
        "http requests",
        "http method",
        "get response",
        "dns resolutions",
        "ip traffic",
        "domains",
        "mutex",
        "samplepath",
        "created",
        "shell commands",
        "r processes",
        "tree",
        "analyze",
        "hostnames",
        "url https",
        "samples",
        "hostname",
        "pattern urls",
        "memory",
        "pattern",
        "pattern domains",
        "roundup",
        "formbook",
        "mirai",
        "ben c",
        "injection",
        "server",
        "scan endpoints",
        "show",
        "august",
        "bq feb",
        "chrome",
        "precondition",
        "virtool",
        "downloadmr",
        "body",
        "status",
        "servers",
        "record value",
        "name servers",
        "showing",
        "mailrubar",
        "trojanclicker",
        "slcc2",
        "media center",
        "delete c",
        "malware beacon",
        "suspicious",
        "class",
        "internal",
        "local",
        "encrypt",
        "as15169 google",
        "gmt cache",
        "twitter",
        "rostpay",
        "date hash",
        "avast avg",
        "mtb may",
        "susp",
        "cryp",
        "win32upatre may",
        "mtb showing",
        "lowfi",
        "aaaa",
        "win32pcmega jan",
        "urlshortner dec",
        "urlshortner sep",
        "as133618",
        "nxdomain",
        "as133775 xiamen",
        "germany unknown",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "whois record",
        "ssl certificate",
        "tsara brashears",
        "resolutions",
        "critical risk",
        "apple phone",
        "unlocker",
        "shell code",
        "installer",
        "ursnif",
        "hacktool",
        "emotet",
        "tracker",
        "chaos",
        "ransomexx",
        "xor ddos",
        "xorddos",
        "mitre attack",
        "parent domain",
        "urls url",
        "siblings",
        "metro",
        "communicating",
        "collection",
        "dropped",
        "skynet",
        "youth",
        "com laude",
        "ltd dba",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "akamaias",
        "digitaloceanasn",
        "csc corporate",
        "pt mora",
        "univjos",
        "etisalat misr",
        "acurix networks",
        "pty ltd",
        "beijing baidu",
        "highly targeted",
        "http",
        "network hijacks",
        "redline stealer",
        "whois sslcert",
        "contacted urls",
        "whois whois",
        "september",
        "hidden cobra",
        "threats",
        "kimsuky",
        "service",
        "read c",
        "create c",
        "write c",
        "regsetvalueexa",
        "mozilla",
        "capture",
        "asnone",
        "domain http",
        "request",
        "malware dns",
        "lookup wannacry",
        "default",
        "ransom",
        "push",
        "playgame",
        "command",
        "email document",
        "exploit domain",
        "owner exploit",
        "kit exploit",
        "source file",
        "hacking tools",
        "hunting macro",
        "malware hosting",
        "memory scanning",
        "yara detections",
        "debug",
        "icmp traffic",
        "pdb path",
        "pe section",
        "low software",
        "packing t1045",
        "ransomware",
        "egregor",
        "find",
        "false",
        "psexec",
        "powershell",
        "qakbot",
        "qbot",
        "icedid"
      ],
      "references": [
        "redhatdelete.com",
        "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
        "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
        "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
        "Trojan-Ransom.Win32.Blocker.jgb Checkin",
        "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "target": null
        },
        {
          "id": "Rostpay",
          "display_name": "Rostpay",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "Mitre Attack",
          "display_name": "Mitre Attack",
          "target": null
        },
        {
          "id": "Chaos (ELF)",
          "display_name": "Chaos (ELF)",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/GameHack",
          "display_name": "TrojanDropper:Win32/GameHack",
          "target": "/malware/TrojanDropper:Win32/GameHack"
        },
        {
          "id": "Win.Ransomware.Locky-7766366-0",
          "display_name": "Win.Ransomware.Locky-7766366-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "ALF:E5.SpikeAex.rhh_pid",
          "display_name": "ALF:E5.SpikeAex.rhh_pid",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1107",
          "name": "File Deletion",
          "display_name": "T1107 - File Deletion"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 65,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1848,
        "FileHash-SHA1": 1783,
        "FileHash-SHA256": 7170,
        "domain": 1649,
        "hostname": 1191,
        "email": 9,
        "URL": 729,
        "CVE": 2,
        "SSLCertFingerprint": 2,
        "CIDR": 1
      },
      "indicator_count": 14384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "760 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d34c91868744aa1449fef2",
      "name": "Locky: File Deletion targeting incriminating archived files.",
      "description": "redhatdelete.com : Adversaries are deleting files in bulk  from Virustotal, otx AlienVault, WebArchive, Perma.cc Urlscan.io, Archive.Today, Archive.ph, iCloud, apple data, photo deletion.\nVarious ransomware used. iOS service modified, cloud encrypted by adversary. Indicator point to a target with a zombie device. An iPhone and potentially other devices were targeted in a specific attack. | Locky Ransomware is a piece of malware that encrypts important files on your device, rendering them inaccessible and unusable.",
      "modified": "2024-03-20T12:00:39.809000",
      "created": "2024-02-19T12:41:52.846000",
      "tags": [
        "it consultant",
        "uk collection",
        "dns intel",
        "ips collection",
        "suspicous ip",
        "whois file",
        "cname",
        "record type",
        "ttl value",
        "algorithm",
        "v3 serial",
        "number",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "whois lookup",
        "region create",
        "domain",
        "name server",
        "registrant name",
        "technical city",
        "region update",
        "united",
        "command decode",
        "mitre att",
        "suricata ipv4",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "ck id",
        "cookie",
        "meta",
        "february",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "dns replication",
        "code",
        "namecheap",
        "registrar abuse",
        "namecheap inc",
        "privacy service",
        "withheld",
        "privacy",
        "dnssec",
        "email",
        "first",
        "bodis",
        "unknown",
        "creation date",
        "search",
        "emails",
        "as397240",
        "date",
        "next",
        "all octoseek",
        "threat roundup",
        "january",
        "june",
        "historical ssl",
        "referrer",
        "contacted",
        "group",
        "execution",
        "phishing",
        "malware",
        "core",
        "malicious",
        "dark power",
        "play ransomware",
        "pe32",
        "intel",
        "ms windows",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "icons library",
        "os2 executable",
        "pe32 linker",
        "gnu linker",
        "compiler",
        "info header",
        "name md5",
        "overlay",
        "passive dns",
        "entries",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "trojan",
        "location united",
        "query",
        "activity dns",
        "observed dns",
        "msie",
        "high",
        "copy",
        "write",
        "win32",
        "hashes",
        "host interaction",
        "sabey type",
        "hallrender",
        "brian sabey",
        "memory pattern",
        "http requests",
        "http method",
        "get response",
        "dns resolutions",
        "ip traffic",
        "domains",
        "mutex",
        "samplepath",
        "created",
        "shell commands",
        "r processes",
        "tree",
        "analyze",
        "hostnames",
        "url https",
        "samples",
        "hostname",
        "pattern urls",
        "memory",
        "pattern",
        "pattern domains",
        "roundup",
        "formbook",
        "mirai",
        "ben c",
        "injection",
        "server",
        "scan endpoints",
        "show",
        "august",
        "bq feb",
        "chrome",
        "precondition",
        "virtool",
        "downloadmr",
        "body",
        "status",
        "servers",
        "record value",
        "name servers",
        "showing",
        "mailrubar",
        "trojanclicker",
        "slcc2",
        "media center",
        "delete c",
        "malware beacon",
        "suspicious",
        "class",
        "internal",
        "local",
        "encrypt",
        "as15169 google",
        "gmt cache",
        "twitter",
        "rostpay",
        "date hash",
        "avast avg",
        "mtb may",
        "susp",
        "cryp",
        "win32upatre may",
        "mtb showing",
        "lowfi",
        "aaaa",
        "win32pcmega jan",
        "urlshortner dec",
        "urlshortner sep",
        "as133618",
        "nxdomain",
        "as133775 xiamen",
        "germany unknown",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "whois record",
        "ssl certificate",
        "tsara brashears",
        "resolutions",
        "critical risk",
        "apple phone",
        "unlocker",
        "shell code",
        "installer",
        "ursnif",
        "hacktool",
        "emotet",
        "tracker",
        "chaos",
        "ransomexx",
        "xor ddos",
        "xorddos",
        "mitre attack",
        "parent domain",
        "urls url",
        "siblings",
        "metro",
        "communicating",
        "collection",
        "dropped",
        "skynet",
        "youth",
        "com laude",
        "ltd dba",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "akamaias",
        "digitaloceanasn",
        "csc corporate",
        "pt mora",
        "univjos",
        "etisalat misr",
        "acurix networks",
        "pty ltd",
        "beijing baidu",
        "highly targeted",
        "http",
        "network hijacks",
        "redline stealer",
        "whois sslcert",
        "contacted urls",
        "whois whois",
        "september",
        "hidden cobra",
        "threats",
        "kimsuky",
        "service",
        "read c",
        "create c",
        "write c",
        "regsetvalueexa",
        "mozilla",
        "capture",
        "asnone",
        "domain http",
        "request",
        "malware dns",
        "lookup wannacry",
        "default",
        "ransom",
        "push",
        "playgame",
        "command",
        "email document",
        "exploit domain",
        "owner exploit",
        "kit exploit",
        "source file",
        "hacking tools",
        "hunting macro",
        "malware hosting",
        "memory scanning",
        "yara detections",
        "debug",
        "icmp traffic",
        "pdb path",
        "pe section",
        "low software",
        "packing t1045",
        "ransomware",
        "egregor",
        "find",
        "false",
        "psexec",
        "powershell",
        "qakbot",
        "qbot",
        "icedid"
      ],
      "references": [
        "redhatdelete.com",
        "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
        "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
        "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
        "Trojan-Ransom.Win32.Blocker.jgb Checkin",
        "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "target": null
        },
        {
          "id": "Rostpay",
          "display_name": "Rostpay",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "Mitre Attack",
          "display_name": "Mitre Attack",
          "target": null
        },
        {
          "id": "Chaos (ELF)",
          "display_name": "Chaos (ELF)",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/GameHack",
          "display_name": "TrojanDropper:Win32/GameHack",
          "target": "/malware/TrojanDropper:Win32/GameHack"
        },
        {
          "id": "Win.Ransomware.Locky-7766366-0",
          "display_name": "Win.Ransomware.Locky-7766366-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "ALF:E5.SpikeAex.rhh_pid",
          "display_name": "ALF:E5.SpikeAex.rhh_pid",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1107",
          "name": "File Deletion",
          "display_name": "T1107 - File Deletion"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 57,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1848,
        "FileHash-SHA1": 1783,
        "FileHash-SHA256": 7170,
        "domain": 1649,
        "hostname": 1191,
        "email": 9,
        "URL": 729,
        "CVE": 2,
        "SSLCertFingerprint": 2,
        "CIDR": 1
      },
      "indicator_count": 14384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "760 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d3acf32e1088e76165a307",
      "name": "Locky: File Deletion targeting incriminating archived files.",
      "description": "",
      "modified": "2024-03-20T12:00:39.809000",
      "created": "2024-02-19T19:33:07.504000",
      "tags": [
        "it consultant",
        "uk collection",
        "dns intel",
        "ips collection",
        "suspicous ip",
        "whois file",
        "cname",
        "record type",
        "ttl value",
        "algorithm",
        "v3 serial",
        "number",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "whois lookup",
        "region create",
        "domain",
        "name server",
        "registrant name",
        "technical city",
        "region update",
        "united",
        "command decode",
        "mitre att",
        "suricata ipv4",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "ck id",
        "cookie",
        "meta",
        "february",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "dns replication",
        "code",
        "namecheap",
        "registrar abuse",
        "namecheap inc",
        "privacy service",
        "withheld",
        "privacy",
        "dnssec",
        "email",
        "first",
        "bodis",
        "unknown",
        "creation date",
        "search",
        "emails",
        "as397240",
        "date",
        "next",
        "all octoseek",
        "threat roundup",
        "january",
        "june",
        "historical ssl",
        "referrer",
        "contacted",
        "group",
        "execution",
        "phishing",
        "malware",
        "core",
        "malicious",
        "dark power",
        "play ransomware",
        "pe32",
        "intel",
        "ms windows",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "icons library",
        "os2 executable",
        "pe32 linker",
        "gnu linker",
        "compiler",
        "info header",
        "name md5",
        "overlay",
        "passive dns",
        "entries",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "trojan",
        "location united",
        "query",
        "activity dns",
        "observed dns",
        "msie",
        "high",
        "copy",
        "write",
        "win32",
        "hashes",
        "host interaction",
        "sabey type",
        "hallrender",
        "brian sabey",
        "memory pattern",
        "http requests",
        "http method",
        "get response",
        "dns resolutions",
        "ip traffic",
        "domains",
        "mutex",
        "samplepath",
        "created",
        "shell commands",
        "r processes",
        "tree",
        "analyze",
        "hostnames",
        "url https",
        "samples",
        "hostname",
        "pattern urls",
        "memory",
        "pattern",
        "pattern domains",
        "roundup",
        "formbook",
        "mirai",
        "ben c",
        "injection",
        "server",
        "scan endpoints",
        "show",
        "august",
        "bq feb",
        "chrome",
        "precondition",
        "virtool",
        "downloadmr",
        "body",
        "status",
        "servers",
        "record value",
        "name servers",
        "showing",
        "mailrubar",
        "trojanclicker",
        "slcc2",
        "media center",
        "delete c",
        "malware beacon",
        "suspicious",
        "class",
        "internal",
        "local",
        "encrypt",
        "as15169 google",
        "gmt cache",
        "twitter",
        "rostpay",
        "date hash",
        "avast avg",
        "mtb may",
        "susp",
        "cryp",
        "win32upatre may",
        "mtb showing",
        "lowfi",
        "aaaa",
        "win32pcmega jan",
        "urlshortner dec",
        "urlshortner sep",
        "as133618",
        "nxdomain",
        "as133775 xiamen",
        "germany unknown",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "whois record",
        "ssl certificate",
        "tsara brashears",
        "resolutions",
        "critical risk",
        "apple phone",
        "unlocker",
        "shell code",
        "installer",
        "ursnif",
        "hacktool",
        "emotet",
        "tracker",
        "chaos",
        "ransomexx",
        "xor ddos",
        "xorddos",
        "mitre attack",
        "parent domain",
        "urls url",
        "siblings",
        "metro",
        "communicating",
        "collection",
        "dropped",
        "skynet",
        "youth",
        "com laude",
        "ltd dba",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "akamaias",
        "digitaloceanasn",
        "csc corporate",
        "pt mora",
        "univjos",
        "etisalat misr",
        "acurix networks",
        "pty ltd",
        "beijing baidu",
        "highly targeted",
        "http",
        "network hijacks",
        "redline stealer",
        "whois sslcert",
        "contacted urls",
        "whois whois",
        "september",
        "hidden cobra",
        "threats",
        "kimsuky",
        "service",
        "read c",
        "create c",
        "write c",
        "regsetvalueexa",
        "mozilla",
        "capture",
        "asnone",
        "domain http",
        "request",
        "malware dns",
        "lookup wannacry",
        "default",
        "ransom",
        "push",
        "playgame",
        "command",
        "email document",
        "exploit domain",
        "owner exploit",
        "kit exploit",
        "source file",
        "hacking tools",
        "hunting macro",
        "malware hosting",
        "memory scanning",
        "yara detections",
        "debug",
        "icmp traffic",
        "pdb path",
        "pe section",
        "low software",
        "packing t1045",
        "ransomware",
        "egregor",
        "find",
        "false",
        "psexec",
        "powershell",
        "qakbot",
        "qbot",
        "icedid"
      ],
      "references": [
        "redhatdelete.com",
        "Mutexes Opened {0C8E6D89-EA51-848A-7775-6C2CC072CA88}",
        "explorer.exe \u2022  Explorer.EXE \u2022\tupnaneat-xex.exe \u2022 akgibik.exe \u2022 wmiadap.exe \u2022 wmiprvse.exe \u2022 winlogon.exe \u2022 tmpo3rfa1vg.exe",
        "https://otx.alienvault.com/indicator/file/f58f360a1f6b5e3e28fa64dd88ec2c9893f2f1d290f4a8cf67ac49952e32cc60",
        "Trojan-Ransom.Win32.Blocker.jgb Checkin",
        "https://otx.alienvault.com/indicator/file/000ad3f22cedbd36e425ca046b2aa0c228754b6fd94d30105ad9343ad9742695"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "display_name": "Trojan-Ransom.Win32.Blocker.jgb Checkin",
          "target": null
        },
        {
          "id": "Rostpay",
          "display_name": "Rostpay",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "Mitre Attack",
          "display_name": "Mitre Attack",
          "target": null
        },
        {
          "id": "Chaos (ELF)",
          "display_name": "Chaos (ELF)",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/GameHack",
          "display_name": "TrojanDropper:Win32/GameHack",
          "target": "/malware/TrojanDropper:Win32/GameHack"
        },
        {
          "id": "Win.Ransomware.Locky-7766366-0",
          "display_name": "Win.Ransomware.Locky-7766366-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "ALF:E5.SpikeAex.rhh_pid",
          "display_name": "ALF:E5.SpikeAex.rhh_pid",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1107",
          "name": "File Deletion",
          "display_name": "T1107 - File Deletion"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65d34c91868744aa1449fef2",
      "export_count": 64,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1848,
        "FileHash-SHA1": 1783,
        "FileHash-SHA256": 7170,
        "domain": 1649,
        "hostname": 1191,
        "email": 9,
        "URL": 729,
        "CVE": 2,
        "SSLCertFingerprint": 2,
        "CIDR": 1
      },
      "indicator_count": 14384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "760 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://accounts.google.com/ServiceLogin",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://accounts.google.com/ServiceLogin",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776647869.4825046
}