{
  "type": "URL",
  "indicator": "https://admin.mail.maxfehlinger.de/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://admin.mail.maxfehlinger.de/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3958167750,
      "indicator": "https://admin.mail.maxfehlinger.de/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "6976d69ecbc0497f97e28618",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:10.502000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6976d6a601f06adcd1ed22fc",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:18.022000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6976d6afd744c55bd596ed6e",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:27.248000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68fd0cc422cea2fd989581fd",
          "name": "LevelBlue - Open Threat Exchange (Malicious Attacks)",
          "description": "I\u2019ll\nrefer to these bad actors as the .lol .fun group. London, Australia , South Africa with US base External resources. With this group, you e probably met though attackers.. OTX errors! Difficult to pulse. There are some profiles in here that are shady and attempt or do co connect to your products. They usually begin social engineering by saying that you have a \u2018problem\u2019 just like they do. Say they are from Canada or\nFrance , somewhere abroad when they are down the street using your services. There was user \u2018Merkd\u2019 whose entire system seem to become infected by someone or someone about this platform. Check the IP address at all\nTo see if it matches or is on the same block as OTC, region will show as well. Hackers may potentially cnc / move your profile on their own block. What happened today was weird. Alien Vault became a PHP and turned bright pink and black, requesting I download page. Keep your systems locked down if you\u2019re researching not reporting vulnerabilities.",
          "modified": "2025-11-24T17:02:12.441000",
          "created": "2025-10-25T17:45:40.291000",
          "tags": [
            "ipv4",
            "levelblue",
            "open threat",
            "date sat",
            "connection",
            "etag w",
            "cloudfront",
            "sameorigin age",
            "vary",
            "ip address",
            "kb body",
            "gtmkvjvztk",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "learn",
            "exchange og",
            "levelblue open",
            "threat exchange",
            "exchange",
            "google tag",
            "iocs",
            "search otx",
            "included iocs",
            "review iocs",
            "data upload",
            "extraction",
            "layer protocol",
            "v full",
            "reports v",
            "port t1571",
            "t1573",
            "oc0006 http",
            "c0014",
            "get http",
            "dns resolutions",
            "user",
            "data",
            "datacrashpad",
            "edge",
            "tag manager",
            "us er",
            "help files",
            "shell",
            "html",
            "cve202323397",
            "iframe tags",
            "community score",
            "url http",
            "url https",
            "united",
            "united kingdom",
            "netherlands",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "indicator role",
            "title added",
            "active related",
            "otc oct",
            "report spam",
            "week ago",
            "scan",
            "learn more",
            "filehashmd5",
            "filehashsha1",
            "domain",
            "australia",
            "does",
            "josh",
            "created",
            "filehashsha256",
            "present jul",
            "present oct",
            "date",
            "a domains",
            "script urls",
            "for privacy",
            "moved",
            "script domains",
            "meta",
            "title",
            "body",
            "pragma",
            "encrypt",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1027",
            "files",
            "information",
            "t1055",
            "injection",
            "capture",
            "south korea",
            "malaysia",
            "pulses",
            "fatal error",
            "hacker known",
            "name",
            "unknown",
            "risk",
            "weeks ago",
            "scary",
            "sova",
            "colorado",
            "wire",
            "name unknown",
            "thursday",
            "denver",
            "types of",
            "indicators hong",
            "kong",
            "tsara brashears",
            "african",
            "ethiopia",
            "b8reactjs",
            "india",
            "america",
            "x ua",
            "hostname",
            "dicator role",
            "pulses url",
            "airplane",
            "icator role",
            "t1432",
            "access contact",
            "list",
            "t1525",
            "image",
            "security scan",
            "heuristic oct",
            "discovery",
            "t1069",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1114",
            "t1480",
            "internal image",
            "brian sabey",
            "month ago",
            "modified",
            "days ago",
            "green well",
            "sabey stash",
            "service",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Sova",
              "display_name": "Sova",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1525",
              "name": "Implant Internal Image",
              "display_name": "T1525 - Implant Internal Image"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 956,
            "FileHash-SHA1": 906,
            "FileHash-SHA256": 2651,
            "URL": 4450,
            "domain": 708,
            "hostname": 2403,
            "CVE": 1,
            "email": 5
          },
          "indicator_count": 12080,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68edc1c2be848e73a32ab9ba",
          "name": "Fatal Error - Hacker Known \u2022  Name Unknown |  Lives @ risk",
          "description": "I am connected to targeteds phone. My location is autonomous _ will show up in Colorado most likely. \n\nScary, this weekend a woman dressed like a peasant somehow managed to give me a letter past Thursday with information about a death in the 11th floor of an Apartment in Denver. The Sova. Alleged drug overdose may have actually been a homicide, I sound & feel crazy, there were names inside , emails ,  plans for Airplane attacks affecting civilians this month. I couldn\u2019t, wouldn\u2019t create this. Apparently UK born citizens sponsored by a Google hierarchy were able to weave their way into the lives a family member & Tsara Brashears . These are white males, anlso involved are citizens from African, Ethiopia, India and America deeply involved. They used fake names and I have said too much. If there is an helpful person on here please help!!! There\nis worse and it might be legal hits to insight money for war!\n#nso_related",
          "modified": "2025-11-13T02:02:12.454000",
          "created": "2025-10-14T03:21:38.305000",
          "tags": [
            "pulses ipv4",
            "ipv4",
            "div div",
            "united",
            "script script",
            "a li",
            "present jul",
            "param",
            "entries",
            "present aug",
            "certificate",
            "global domains",
            "date",
            "title",
            "class",
            "meta",
            "agent",
            "stack",
            "life",
            "a domains",
            "passive dns",
            "urls",
            "ok server",
            "gmt content",
            "type",
            "hostname add",
            "pulse pulses",
            "files",
            "win32mydoom oct",
            "trojan",
            "next associated",
            "pulse",
            "reverse dns",
            "twitter",
            "body",
            "dynamicloader",
            "crlf line",
            "unicode text",
            "utf8",
            "ee fc",
            "yara rule",
            "ff d5",
            "ascii text",
            "f0 ff",
            "eb e1",
            "unknown",
            "copy",
            "write",
            "malware",
            "push",
            "next",
            "autorun",
            "suspicious",
            "ip address",
            "unknown ns",
            "unknown aaaa",
            "ipv4 add",
            "location united",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "pattern match",
            "ck id",
            "show technique",
            "mitre att",
            "path",
            "error",
            "fatalerror",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "filehashsha256",
            "filehashmd5",
            "filehashsha1",
            "iist",
            "malware family",
            "mydoom att",
            "ck ids",
            "t1060",
            "run keys",
            "indicator role",
            "title added",
            "active related",
            "showing",
            "url https",
            "url http",
            "startup",
            "folder",
            "web protocols",
            "t1105",
            "tool transfer",
            "indicators hong",
            "kong",
            "china",
            "germany",
            "australia",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "wire",
            "t1071"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1525",
              "name": "Implant Internal Image",
              "display_name": "T1525 - Implant Internal Image"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2724,
            "hostname": 1212,
            "domain": 410,
            "FileHash-MD5": 408,
            "email": 9,
            "FileHash-SHA256": 604,
            "FileHash-SHA1": 307
          },
          "indicator_count": 5674,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68dda4bcade283258f6ed707",
          "name": "Delta Server - Phishing",
          "description": "Related to FBI.gov and maliciously coded image found on Google image search result on a fully updated yet hacked iOS device.",
          "modified": "2025-10-31T21:05:05.615000",
          "created": "2025-10-01T22:01:32.571000",
          "tags": [
            "related pulses",
            "delta server",
            "phishing",
            "fbi.gov?",
            "hacked images",
            "gogle",
            "google search",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "access att",
            "windows nt",
            "size",
            "mitre att",
            "path",
            "general",
            "local",
            "click",
            "strings",
            "dynamicloader",
            "eke eekeeeke",
            "eeye",
            "eekeee ee",
            "eekeeeke eekeee",
            "search",
            "delete",
            "yara detections",
            "eeeee e",
            "yara rule",
            "write",
            "trojan",
            "dynamic_loading_function",
            "command_and_control"
          ],
          "references": [
            "http://autoconfig.delterserver.org/",
            "https://hybrid-analysis.com/sample/904630d9e73c404a0581c822970935ae49940d09402a55d96712293baa5e8061/68dd9a7397836f17be0d1485",
            "Yara Detections: stack_string ,  case_4485_ekix4 Alerts: procmem_yara dynamic_function_loading",
            "Alerts: network_cnc_https_generic",
            "Alerts : dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Contacted  104.20.151.16",
            "Alerts: dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Domains Contacted : 104.20.151.16"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 463,
            "domain": 60,
            "hostname": 210,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 85,
            "FileHash-SHA256": 203,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 1073,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "169 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67035385a884405e783f9a7e",
          "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
          "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
          "modified": "2024-11-06T01:02:24.390000",
          "created": "2024-10-07T03:20:37.224000",
          "tags": [
            "canada unknown",
            "redacted for",
            "as25825",
            "all scoreblue",
            "passive dns",
            "ipv4",
            "reverse dns",
            "next",
            "for privacy",
            "cname",
            "united states",
            "nxdomain",
            "ns nxdomain",
            "united",
            "as21928",
            "south korea",
            "as9318 sk",
            "taiwan as3462",
            "as701 verizon",
            "search",
            "maxage apt",
            "minage apt",
            "maxsize apt",
            "malware",
            "as44273 host",
            "creation date",
            "status",
            "showing",
            "record value",
            "certificate",
            "date",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "flag united",
            "domain",
            "files related",
            "intel",
            "ms windows",
            "users",
            "pe32",
            "number",
            "ascii text",
            "crlf line",
            "database",
            "english",
            "tue jun",
            "installer",
            "template",
            "trojan",
            "write",
            "registrar",
            "pulse submit",
            "url analysis",
            "files",
            "msie",
            "chrome",
            "rdds service",
            "record",
            "registrant",
            "admin",
            "tech contact",
            "name servers",
            "email please",
            "moved",
            "trojanproxy",
            "virtool",
            "as1221",
            "aaaa",
            "asnone united",
            "show",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "script urls",
            "gmt path",
            "fedora",
            "open ports",
            "nginx http",
            "server",
            "a domains",
            "gmt content",
            "set cookie",
            "gmt etag",
            "accept",
            "expiration date",
            "backdoor",
            "mirai",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "hostname",
            "verdict",
            "unknown",
            "new pulse",
            "loveland",
            "america asn",
            "Generic36.ABKD",
            "domains",
            "location canada",
            "as32133",
            "files ip",
            "address domain",
            "path max",
            "age86400 set",
            "cookie",
            "type",
            "entries",
            "script domains",
            "downloader",
            "body",
            "servers",
            "emails",
            "gmt max",
            "title",
            "meta",
            "as20940",
            "as16625 akamai",
            "west domains",
            "as4230 claro",
            "copy",
            "sabey",
            "contacted"
          ],
          "references": [
            "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
            "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
            "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
            "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
            "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
            "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
            "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
            "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
            "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
            "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
            "Domains Contacted: ntp.ubuntu.com",
            "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
            "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
            "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
            "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
            "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
            "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
            "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
            "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Taiwan",
            "Philippines",
            "India",
            "Italy",
            "Germany",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-BZ\\ [Trj]",
              "display_name": "ELF:Mirai-BZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai_Botnet_Malware",
              "display_name": "Mirai_Botnet_Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Unix.Trojan.Mirai-6976991-0",
              "display_name": "Unix.Trojan.Mirai-6976991-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.B",
              "display_name": "Backdoor:Linux/Mirai.B",
              "target": "/malware/Backdoor:Linux/Mirai.B"
            },
            {
              "id": "TrojanDownloader:Win32/Fosniw",
              "display_name": "TrojanDownloader:Win32/Fosniw",
              "target": "/malware/TrojanDownloader:Win32/Fosniw"
            },
            {
              "id": "TrojanClicker:Win32/Frosparf",
              "display_name": "TrojanClicker:Win32/Frosparf",
              "target": "/malware/TrojanClicker:Win32/Frosparf"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            }
          ],
          "industries": [
            "Legal",
            "Healthcare",
            "Education"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1230,
            "email": 16,
            "hostname": 1560,
            "URL": 3400,
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 544,
            "FileHash-SHA1": 496,
            "CVE": 1
          },
          "indicator_count": 8311,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "529 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "freedns.afraid.org",
        "Yara Detections: stack_string ,  case_4485_ekix4 Alerts: procmem_yara dynamic_function_loading",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "Scanning Host: 13.107.246.70",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://jviwczq.zc-apple.com/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Domains Contacted: ntp.ubuntu.com",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Alerts: cape_detected_threat https_ urls",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "api.optimizer.insitemaxdev.gov2x.com",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "Pegasus | A targets devices are obviously infiltrated",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Domains Contacted: drive.usercontent.google.com",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "supply.qld.gov.au",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "http://autoconfig.delterserver.org/",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supplierportal.gov2x.com",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "http://blackrock.work.gd/",
        "Alerts : dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Contacted  104.20.151.16",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "Alerts: network_cnc_https_generic",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "Malware Hosting: 13.107.226.70",
        "Sprouts Farmers Market",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "iot.insitemaxdev.gov2x.com",
        "Sabey , Ahmann, Quasi Government, Government",
        "verify.gov.tl",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "sprouts@em.sprouts.com?",
        "https://hybrid-analysis.com/sample/904630d9e73c404a0581c822970935ae49940d09402a55d96712293baa5e8061/68dd9a7397836f17be0d1485",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "okta-dev.gov2x.com",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc.",
        "Alerts: dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Domains Contacted : 104.20.151.16",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Alf:program:win32/webcompanion",
            "Trojan:win32/zombie.a",
            "Win.trojan.pushdo-15",
            "Backdoor:linux/mirai.b",
            "Alf:trojan:win32/anorocuriv.a",
            "Sova",
            "Elf:mirai-bz\\ [trj]",
            "Slf:win64/cobpipe.a",
            "Mirai_botnet_malware",
            "Virtool:win32/ceeinject.gen!ah",
            "Unix.trojan.mirai-6976991-0",
            "Win.trojan.vbgeneric-6735875-0",
            "Win32:trojano-chf\\ [trj]",
            "Trojandownloader:win32/cutwail.bs",
            "Trojandownloader:win32/fosniw",
            "Win.trojan.cobaltstrike-9044898-1",
            "Trojanclicker:win32/frosparf",
            "Win.trojan.emotet-9850453-0",
            "Mirai",
            "Sf:shellcode-au\\ [trj]",
            "Win32:evo-gen\\ [susp]",
            "Pegasus",
            "Worm:win32/mofksys.rnd!mtb",
            "#lowfi:hookwowlow",
            "Worm:win32/autorun!atmn",
            "Win.downloader.3867-1"
          ],
          "industries": [
            "Government",
            "Legal",
            "Technology",
            "Education",
            "Retail",
            "Healthcare"
          ],
          "unique_indicators": 42162
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/maxfehlinger.de",
    "whois": "http://whois.domaintools.com/maxfehlinger.de",
    "domain": "maxfehlinger.de",
    "hostname": "admin.mail.maxfehlinger.de"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "6976d69ecbc0497f97e28618",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:10.502000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6976d6a601f06adcd1ed22fc",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:18.022000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6976d6afd744c55bd596ed6e",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:27.248000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68fd0cc422cea2fd989581fd",
      "name": "LevelBlue - Open Threat Exchange (Malicious Attacks)",
      "description": "I\u2019ll\nrefer to these bad actors as the .lol .fun group. London, Australia , South Africa with US base External resources. With this group, you e probably met though attackers.. OTX errors! Difficult to pulse. There are some profiles in here that are shady and attempt or do co connect to your products. They usually begin social engineering by saying that you have a \u2018problem\u2019 just like they do. Say they are from Canada or\nFrance , somewhere abroad when they are down the street using your services. There was user \u2018Merkd\u2019 whose entire system seem to become infected by someone or someone about this platform. Check the IP address at all\nTo see if it matches or is on the same block as OTC, region will show as well. Hackers may potentially cnc / move your profile on their own block. What happened today was weird. Alien Vault became a PHP and turned bright pink and black, requesting I download page. Keep your systems locked down if you\u2019re researching not reporting vulnerabilities.",
      "modified": "2025-11-24T17:02:12.441000",
      "created": "2025-10-25T17:45:40.291000",
      "tags": [
        "ipv4",
        "levelblue",
        "open threat",
        "date sat",
        "connection",
        "etag w",
        "cloudfront",
        "sameorigin age",
        "vary",
        "ip address",
        "kb body",
        "gtmkvjvztk",
        "utc gcfezl5ynvb",
        "utc na",
        "utc google",
        "analytics na",
        "utc linkedin",
        "insight tag",
        "learn",
        "exchange og",
        "levelblue open",
        "threat exchange",
        "exchange",
        "google tag",
        "iocs",
        "search otx",
        "included iocs",
        "review iocs",
        "data upload",
        "extraction",
        "layer protocol",
        "v full",
        "reports v",
        "port t1571",
        "t1573",
        "oc0006 http",
        "c0014",
        "get http",
        "dns resolutions",
        "user",
        "data",
        "datacrashpad",
        "edge",
        "tag manager",
        "us er",
        "help files",
        "shell",
        "html",
        "cve202323397",
        "iframe tags",
        "community score",
        "url http",
        "url https",
        "united",
        "united kingdom",
        "netherlands",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "indicator role",
        "title added",
        "active related",
        "otc oct",
        "report spam",
        "week ago",
        "scan",
        "learn more",
        "filehashmd5",
        "filehashsha1",
        "domain",
        "australia",
        "does",
        "josh",
        "created",
        "filehashsha256",
        "present jul",
        "present oct",
        "date",
        "a domains",
        "script urls",
        "for privacy",
        "moved",
        "script domains",
        "meta",
        "title",
        "body",
        "pragma",
        "encrypt",
        "ck ids",
        "t1060",
        "run keys",
        "startup",
        "folder",
        "t1027",
        "files",
        "information",
        "t1055",
        "injection",
        "capture",
        "south korea",
        "malaysia",
        "pulses",
        "fatal error",
        "hacker known",
        "name",
        "unknown",
        "risk",
        "weeks ago",
        "scary",
        "sova",
        "colorado",
        "wire",
        "name unknown",
        "thursday",
        "denver",
        "types of",
        "indicators hong",
        "kong",
        "tsara brashears",
        "african",
        "ethiopia",
        "b8reactjs",
        "india",
        "america",
        "x ua",
        "hostname",
        "dicator role",
        "pulses url",
        "airplane",
        "icator role",
        "t1432",
        "access contact",
        "list",
        "t1525",
        "image",
        "security scan",
        "heuristic oct",
        "discovery",
        "t1069",
        "t1071",
        "protocol",
        "t1105",
        "tool transfer",
        "t1114",
        "t1480",
        "internal image",
        "brian sabey",
        "month ago",
        "modified",
        "days ago",
        "green well",
        "sabey stash",
        "service",
        "t1040",
        "sniffing",
        "t1045",
        "packing",
        "t1053",
        "taskjob"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Sova",
          "display_name": "Sova",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1525",
          "name": "Implant Internal Image",
          "display_name": "T1525 - Implant Internal Image"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1448",
          "name": "Carrier Billing Fraud",
          "display_name": "T1448 - Carrier Billing Fraud"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 956,
        "FileHash-SHA1": 906,
        "FileHash-SHA256": 2651,
        "URL": 4450,
        "domain": 708,
        "hostname": 2403,
        "CVE": 1,
        "email": 5
      },
      "indicator_count": 12080,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "146 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68edc1c2be848e73a32ab9ba",
      "name": "Fatal Error - Hacker Known \u2022  Name Unknown |  Lives @ risk",
      "description": "I am connected to targeteds phone. My location is autonomous _ will show up in Colorado most likely. \n\nScary, this weekend a woman dressed like a peasant somehow managed to give me a letter past Thursday with information about a death in the 11th floor of an Apartment in Denver. The Sova. Alleged drug overdose may have actually been a homicide, I sound & feel crazy, there were names inside , emails ,  plans for Airplane attacks affecting civilians this month. I couldn\u2019t, wouldn\u2019t create this. Apparently UK born citizens sponsored by a Google hierarchy were able to weave their way into the lives a family member & Tsara Brashears . These are white males, anlso involved are citizens from African, Ethiopia, India and America deeply involved. They used fake names and I have said too much. If there is an helpful person on here please help!!! There\nis worse and it might be legal hits to insight money for war!\n#nso_related",
      "modified": "2025-11-13T02:02:12.454000",
      "created": "2025-10-14T03:21:38.305000",
      "tags": [
        "pulses ipv4",
        "ipv4",
        "div div",
        "united",
        "script script",
        "a li",
        "present jul",
        "param",
        "entries",
        "present aug",
        "certificate",
        "global domains",
        "date",
        "title",
        "class",
        "meta",
        "agent",
        "stack",
        "life",
        "a domains",
        "passive dns",
        "urls",
        "ok server",
        "gmt content",
        "type",
        "hostname add",
        "pulse pulses",
        "files",
        "win32mydoom oct",
        "trojan",
        "next associated",
        "pulse",
        "reverse dns",
        "twitter",
        "body",
        "dynamicloader",
        "crlf line",
        "unicode text",
        "utf8",
        "ee fc",
        "yara rule",
        "ff d5",
        "ascii text",
        "f0 ff",
        "eb e1",
        "unknown",
        "copy",
        "write",
        "malware",
        "push",
        "next",
        "autorun",
        "suspicious",
        "ip address",
        "unknown ns",
        "unknown aaaa",
        "ipv4 add",
        "location united",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "pattern match",
        "ck id",
        "show technique",
        "mitre att",
        "path",
        "error",
        "fatalerror",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "filehashsha256",
        "filehashmd5",
        "filehashsha1",
        "iist",
        "malware family",
        "mydoom att",
        "ck ids",
        "t1060",
        "run keys",
        "indicator role",
        "title added",
        "active related",
        "showing",
        "url https",
        "url http",
        "startup",
        "folder",
        "web protocols",
        "t1105",
        "tool transfer",
        "indicators hong",
        "kong",
        "china",
        "germany",
        "australia",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "wire",
        "t1071"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1525",
          "name": "Implant Internal Image",
          "display_name": "T1525 - Implant Internal Image"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2724,
        "hostname": 1212,
        "domain": 410,
        "FileHash-MD5": 408,
        "email": 9,
        "FileHash-SHA256": 604,
        "FileHash-SHA1": 307
      },
      "indicator_count": 5674,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68dda4bcade283258f6ed707",
      "name": "Delta Server - Phishing",
      "description": "Related to FBI.gov and maliciously coded image found on Google image search result on a fully updated yet hacked iOS device.",
      "modified": "2025-10-31T21:05:05.615000",
      "created": "2025-10-01T22:01:32.571000",
      "tags": [
        "related pulses",
        "delta server",
        "phishing",
        "fbi.gov?",
        "hacked images",
        "gogle",
        "google search",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "access att",
        "windows nt",
        "size",
        "mitre att",
        "path",
        "general",
        "local",
        "click",
        "strings",
        "dynamicloader",
        "eke eekeeeke",
        "eeye",
        "eekeee ee",
        "eekeeeke eekeee",
        "search",
        "delete",
        "yara detections",
        "eeeee e",
        "yara rule",
        "write",
        "trojan",
        "dynamic_loading_function",
        "command_and_control"
      ],
      "references": [
        "http://autoconfig.delterserver.org/",
        "https://hybrid-analysis.com/sample/904630d9e73c404a0581c822970935ae49940d09402a55d96712293baa5e8061/68dd9a7397836f17be0d1485",
        "Yara Detections: stack_string ,  case_4485_ekix4 Alerts: procmem_yara dynamic_function_loading",
        "Alerts: network_cnc_https_generic",
        "Alerts : dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Contacted  104.20.151.16",
        "Alerts: dead_connect antidebug_setunhandledexceptionfilter exec_crash IP\u2019s Domains Contacted : 104.20.151.16"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 463,
        "domain": 60,
        "hostname": 210,
        "FileHash-MD5": 51,
        "FileHash-SHA1": 85,
        "FileHash-SHA256": 203,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 1073,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "169 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67035385a884405e783f9a7e",
      "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
      "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
      "modified": "2024-11-06T01:02:24.390000",
      "created": "2024-10-07T03:20:37.224000",
      "tags": [
        "canada unknown",
        "redacted for",
        "as25825",
        "all scoreblue",
        "passive dns",
        "ipv4",
        "reverse dns",
        "next",
        "for privacy",
        "cname",
        "united states",
        "nxdomain",
        "ns nxdomain",
        "united",
        "as21928",
        "south korea",
        "as9318 sk",
        "taiwan as3462",
        "as701 verizon",
        "search",
        "maxage apt",
        "minage apt",
        "maxsize apt",
        "malware",
        "as44273 host",
        "creation date",
        "status",
        "showing",
        "record value",
        "certificate",
        "date",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "flag united",
        "domain",
        "files related",
        "intel",
        "ms windows",
        "users",
        "pe32",
        "number",
        "ascii text",
        "crlf line",
        "database",
        "english",
        "tue jun",
        "installer",
        "template",
        "trojan",
        "write",
        "registrar",
        "pulse submit",
        "url analysis",
        "files",
        "msie",
        "chrome",
        "rdds service",
        "record",
        "registrant",
        "admin",
        "tech contact",
        "name servers",
        "email please",
        "moved",
        "trojanproxy",
        "virtool",
        "as1221",
        "aaaa",
        "asnone united",
        "show",
        "filehash",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "script urls",
        "gmt path",
        "fedora",
        "open ports",
        "nginx http",
        "server",
        "a domains",
        "gmt content",
        "set cookie",
        "gmt etag",
        "accept",
        "expiration date",
        "backdoor",
        "mirai",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "hostname",
        "verdict",
        "unknown",
        "new pulse",
        "loveland",
        "america asn",
        "Generic36.ABKD",
        "domains",
        "location canada",
        "as32133",
        "files ip",
        "address domain",
        "path max",
        "age86400 set",
        "cookie",
        "type",
        "entries",
        "script domains",
        "downloader",
        "body",
        "servers",
        "emails",
        "gmt max",
        "title",
        "meta",
        "as20940",
        "as16625 akamai",
        "west domains",
        "as4230 claro",
        "copy",
        "sabey",
        "contacted"
      ],
      "references": [
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "Domains Contacted: ntp.ubuntu.com",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "Taiwan",
        "Philippines",
        "India",
        "Italy",
        "Germany",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-BZ\\ [Trj]",
          "display_name": "ELF:Mirai-BZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai_Botnet_Malware",
          "display_name": "Mirai_Botnet_Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Unix.Trojan.Mirai-6976991-0",
          "display_name": "Unix.Trojan.Mirai-6976991-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.B",
          "display_name": "Backdoor:Linux/Mirai.B",
          "target": "/malware/Backdoor:Linux/Mirai.B"
        },
        {
          "id": "TrojanDownloader:Win32/Fosniw",
          "display_name": "TrojanDownloader:Win32/Fosniw",
          "target": "/malware/TrojanDownloader:Win32/Fosniw"
        },
        {
          "id": "TrojanClicker:Win32/Frosparf",
          "display_name": "TrojanClicker:Win32/Frosparf",
          "target": "/malware/TrojanClicker:Win32/Frosparf"
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        }
      ],
      "industries": [
        "Legal",
        "Healthcare",
        "Education"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1230,
        "email": 16,
        "hostname": 1560,
        "URL": 3400,
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 544,
        "FileHash-SHA1": 496,
        "CVE": 1
      },
      "indicator_count": 8311,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "529 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://admin.mail.maxfehlinger.de/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://admin.mail.maxfehlinger.de/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776630474.7819927
}