{
  "type": "URL",
  "indicator": "https://adservice.google.off.ai",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://adservice.google.off.ai",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3783461652,
      "indicator": "https://adservice.google.off.ai",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 28,
      "pulses": [
        {
          "id": "69aa0a62f94a92b5168405c2",
          "name": "fedpaypal clone Q vashti",
          "description": "",
          "modified": "2026-03-06T06:39:27.872000",
          "created": "2026-03-05T22:57:38.559000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68c5743593a4bcc81dd94b0b",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1323,
            "URL": 4360,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "45 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6940b852c28f2a2c6abb4aad",
          "name": "FRITZ!Box \u2026.Connecting to Apple devices",
          "description": "Connecting to targeted Apple\ndevices overnight. \n\nHow to connect to the FRITZ!Box, how to access all of the product's functions, and what to do with the device if you are not connected to it in your home network.",
          "modified": "2026-01-15T01:02:47.757000",
          "created": "2025-12-16T01:39:30.381000",
          "tags": [
            "fritz",
            "strong",
            "main navigation",
            "deutsch",
            "englisch",
            "funktionen der",
            "verbindung zur",
            "wifi",
            "ip address",
            "box avm",
            "lowfi",
            "win32",
            "susp",
            "urls",
            "files",
            "asn as44716",
            "related tags",
            "indicator facts",
            "germany unknown",
            "a domains",
            "meta",
            "typo3",
            "body doctype",
            "kasper skaarhoj",
            "gmt server",
            "pragma",
            "a nxdomain",
            "nxdomain",
            "whitelisted",
            "present aug",
            "present jul",
            "present oct",
            "present jun",
            "united",
            "present sep",
            "present nov",
            "next http",
            "scans show",
            "title",
            "div div",
            "a li",
            "wir suchen",
            "li ul",
            "avm karriere",
            "dich a",
            "reverse dns",
            "berlin",
            "germany asn",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "none related",
            "passive dns",
            "ipv4",
            "url analysis",
            "present dec",
            "moved",
            "certificate",
            "vertriebs gmbh",
            "aaaa",
            "as12732 gutcon",
            "domain",
            "hostname",
            "verdict",
            "files ip",
            "address",
            "germany",
            "as13335",
            "as8220 colt",
            "present may",
            "united kingdom",
            "regsetvalueexa",
            "regdword",
            "regbinary",
            "show",
            "yara detections",
            "regsetvalueexw",
            "regsz",
            "medium",
            "suspicious",
            "delphi",
            "malware",
            "write",
            "as6878",
            "msie",
            "chrome",
            "gmt content",
            "germany showing",
            "createobject",
            "set http",
            "search",
            "high",
            "read c",
            "et trojan",
            "jfif",
            "ascii text",
            "detected",
            "trojan generic",
            "checkin",
            "pony downloader",
            "http library",
            "virustotal",
            "riskware",
            "mcafee",
            "drweb",
            "vipre",
            "trojan",
            "panda",
            "next",
            "unknown",
            "as15169 google",
            "status",
            "name servers",
            "record value",
            "emails",
            "error",
            "trojandropper",
            "results dec",
            "ddos",
            "worm",
            "mtb trojan",
            "mtb apr",
            "exev2e",
            "ia256",
            "extraction",
            "get http",
            "post http",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "germany germany",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "show technique",
            "ck matrix",
            "show process",
            "network traffic",
            "t1057",
            "t1071",
            "hybrid",
            "local",
            "path",
            "t1204 user",
            "defense evasion",
            "t1480 execution",
            "sha1",
            "sha256",
            "size",
            "script",
            "null",
            "span",
            "refresh",
            "footer",
            "body",
            "june",
            "general",
            "click",
            "strings",
            "tools",
            "tracker",
            "code",
            "look",
            "verify",
            "restart",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "process details",
            "flag",
            "link",
            "present feb",
            "servers",
            "redacted for",
            "as20546 soprado",
            "encrypt",
            "mtb sep",
            "ransom",
            "next associated",
            "twitter",
            "virtool",
            "hostname add",
            "location russia",
            "as200350",
            "russia unknown",
            "federation flag",
            "ipv4 add",
            "asn as200350",
            "related",
            "domain add",
            "unknown ns",
            "expiration date",
            "http version",
            "windows nt",
            "gbot",
            "post method",
            "port",
            "destination",
            "delete",
            "get na",
            "as15169",
            "expiration",
            "url https",
            "no expiration",
            "showing",
            "entries",
            "url add",
            "pulse pulses",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "unknown cname",
            "cname",
            "asn as24940",
            "less",
            "date",
            "pulse submit"
          ],
          "references": [
            "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
            "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
            "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
            "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
            "Subject: DE Certificate Subject: Berlin Certificate Subject",
            "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
            "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
            "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
            "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
            "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
            "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
            "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
            "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
            "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
            "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
            "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
            "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
            "http://netuser.joymeng.com/charge_apple/notify",
            "https://www.passcreator.com/en/apple-wallet-passes",
            "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
            "apple-business.cancom.at",
            "Apple - 162.55.158.153",
            "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
            "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283",
            "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
            "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
            "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#LowFi:Tool:Win32/VbsToExeV2E",
              "display_name": "#LowFi:Tool:Win32/VbsToExeV2E",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Androp",
              "display_name": "Androp",
              "target": null
            },
            {
              "id": "Inject.BRDV",
              "display_name": "Inject.BRDV",
              "target": null
            },
            {
              "id": "Win32:Androp",
              "display_name": "Win32:Androp",
              "target": null
            },
            {
              "id": "Crypt2.AZDI",
              "display_name": "Crypt2.AZDI",
              "target": null
            },
            {
              "id": "TEL:MSIL/DlSocConSend",
              "display_name": "TEL:MSIL/DlSocConSend",
              "target": "/malware/TEL:MSIL/DlSocConSend"
            },
            {
              "id": "DDOS:Linux/Lightaidra",
              "display_name": "DDOS:Linux/Lightaidra",
              "target": "/malware/DDOS:Linux/Lightaidra"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "Trojan:Win32/Salgorea.C!MTB",
              "display_name": "Trojan:Win32/Salgorea.C!MTB",
              "target": "/malware/Trojan:Win32/Salgorea.C!MTB"
            },
            {
              "id": "Worm:Win32/Autorun.XFV",
              "display_name": "Worm:Win32/Autorun.XFV",
              "target": "/malware/Worm:Win32/Autorun.XFV"
            },
            {
              "id": "Trojan:Win32/Blihan.A",
              "display_name": "Trojan:Win32/Blihan.A",
              "target": "/malware/Trojan:Win32/Blihan.A"
            },
            {
              "id": "Worm:Win32/Yuner.A",
              "display_name": "Worm:Win32/Yuner.A",
              "target": "/malware/Worm:Win32/Yuner.A"
            },
            {
              "id": "Win.Trojan.Zegost",
              "display_name": "Win.Trojan.Zegost",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass",
              "display_name": "PWS:Win32/QQpass",
              "target": "/malware/PWS:Win32/QQpass"
            },
            {
              "id": "Trojan:Win32/Glupteba.MT!MTB",
              "display_name": "Trojan:Win32/Glupteba.MT!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "Win.Trojan.Generic",
              "display_name": "Win.Trojan.Generic",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop.V!MTB",
              "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
              "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Win32/Trickler",
              "display_name": "Win32/Trickler",
              "target": null
            },
            {
              "id": "Win.Malware.Hd0kzai-9985588-0",
              "display_name": "Win.Malware.Hd0kzai-9985588-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aenjaris.AL!bit",
              "display_name": "Trojan:Win32/Aenjaris.AL!bit",
              "target": "/malware/Trojan:Win32/Aenjaris.AL!bit"
            },
            {
              "id": "Trojan:Win32/Agent.AG!MTB",
              "display_name": "Trojan:Win32/Agent.AG!MTB",
              "target": "/malware/Trojan:Win32/Agent.AG!MTB"
            },
            {
              "id": "Trojan:Win32/Salgorea",
              "display_name": "Trojan:Win32/Salgorea",
              "target": "/malware/Trojan:Win32/Salgorea"
            },
            {
              "id": "Win.Malware.Barys-6840738-0",
              "display_name": "Win.Malware.Barys-6840738-0",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Trojan:Win32/EyeStye.T",
              "display_name": "Trojan:Win32/EyeStye.T",
              "target": "/malware/Trojan:Win32/EyeStye.T"
            },
            {
              "id": "wormWin32/Mofksys.RND!MTB",
              "display_name": "wormWin32/Mofksys.RND!MTB",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/VB.IL",
              "display_name": "TrojanDropper:Win32/VB.IL",
              "target": "/malware/TrojanDropper:Win32/VB.IL"
            },
            {
              "id": "CVE 2007695",
              "display_name": "CVE 2007695",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1008",
              "name": "Fallback Channels",
              "display_name": "T1008 - Fallback Channels"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 927,
            "hostname": 2093,
            "FileHash-SHA256": 1474,
            "URL": 5935,
            "FileHash-MD5": 351,
            "FileHash-SHA1": 252,
            "email": 5,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692e068ff95076bb8e75bd9f",
          "name": "Telehealth Exploit",
          "description": "",
          "modified": "2025-12-31T21:02:25",
          "created": "2025-12-01T21:20:15.043000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "safe browsing",
            "present dec",
            "status",
            "date",
            "united",
            "name servers",
            "netherlands",
            "unknown ns",
            "ip address",
            "search",
            "showing",
            "local",
            "data upload",
            "extraction",
            "flag",
            "bad traffic",
            "et hunting",
            "domain m2",
            "suspicious tls",
            "sni request",
            "windir",
            "openurl c",
            "dns requests",
            "et info",
            "tls handshake",
            "prefetch2",
            "analysis",
            "tor analysis",
            "domain address",
            "tlsv1",
            "jfif",
            "jpeg image",
            "ascii text",
            "entries",
            "as15169",
            "show",
            "read c",
            "write",
            "next",
            "persistence",
            "execution",
            "crash",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 555,
            "URL": 1803,
            "FileHash-SHA256": 1437,
            "FileHash-MD5": 113,
            "FileHash-SHA1": 13,
            "email": 4,
            "SSLCertFingerprint": 18,
            "CVE": 1
          },
          "indicator_count": 4204,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "109 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68dc624893ea922b898f911b",
          "name": "FBI? Ghe real one? Idk - Cab / Deive by compromised an iOS device",
          "description": "Checking a targets phone, it\u2019s seems very infected with limited results on google searches results. I clicked on an image I thought looked suspicious. Image was coded. I have no idea if this is the FBI I haven\u2019t examined or researched for vulnerabilities yet. I will break this down over time. The number is kept alive but number could not be verified , it was a different number altogether. The phone was out of service, I reached out to 911. And spoke to a person I can\u2019t verify. The service was reconnected a day later. It\u2019s a very crazy hack!",
          "modified": "2025-10-30T22:01:00.256000",
          "created": "2025-09-30T23:05:44.154000",
          "tags": [
            "search",
            "google search",
            "in a",
            "relevance",
            "internet storm",
            "intranet",
            "part",
            "steps",
            "hyper v",
            "windowssystem32",
            "ping request",
            "algorithm",
            "ouno sni",
            "key usage",
            "google llc",
            "v3 serial",
            "number",
            "public key",
            "info",
            "key algorithm",
            "domain",
            "subject key",
            "identifier",
            "net173",
            "net1730000",
            "gogl",
            "orgid",
            "gogl address",
            "city",
            "mountain view",
            "stateprov",
            "postalcode",
            "registrar",
            "ip address",
            "http",
            "port",
            "accept",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "shutdown",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "defense evasion",
            "spawns",
            "found",
            "united",
            "ascii text",
            "pattern match",
            "mitre att",
            "title",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "body",
            "initial access",
            "local",
            "passive dns",
            "urls",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "backdoor",
            "status",
            "aaaa",
            "date",
            "name servers",
            "record value",
            "emails",
            "present aug",
            "present sep",
            "moved",
            "error",
            "antivm",
            "drive by",
            "cab by"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 544,
            "FileHash-SHA256": 2300,
            "URL": 3905,
            "hostname": 1675,
            "FileHash-MD5": 209,
            "FileHash-SHA1": 210,
            "CIDR": 1,
            "email": 7,
            "SSLCertFingerprint": 8,
            "CVE": 2
          },
          "indicator_count": 8861,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "171 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c5743593a4bcc81dd94b0b",
          "name": "Fed.PayPal.com - Ransom | Attacks via redirect",
          "description": "A monitored target, active on various payment platforms for business documented a malicious redirect event 1st seen in 2020. Follows pattern of multiple, critical and ongoing attacks beginning in 2013. In this instance target lost access to PayPal payments. If this is legal, it\u2019s been a grotesque grift. Target was financially and otherwise robbed.\n\n\n#trulymissed #paypal #advesaries #apple #twitter #backdoor #ransom #botnet #reptutationattack",
          "modified": "2025-10-13T13:27:11.277000",
          "created": "2025-09-13T13:40:05.671000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1321,
            "URL": 4356,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13415,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "189 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687605f986433ebf2673f0b8",
          "name": "Win.Malware.Downloadguide-6803841-0 | Patient Monitoring",
          "description": "Part of an elaborate, unrelenting espionage campaign , multiple compromises, targeting.\n> alf:PUA:Win32/DownloadGuide \nLink below found in previous Pulse -[http://s0.patient.media/res/f91b97f6b547405cb4370cbb003dfea2-jquery-1.11.1.min.js.gzip]\n\u2022 Win.Malware.Downloadguide-6803841-0\nYara:\nresearch_pe_signed_outside_timestamp\n\u2022\nkernel32_dll_xor_exe_key_51_key_byte_encoded \u2022\nxor_0x33_kernel32_dll \u2022 \nConcerning: {Domain\tAddress\tRegistrar\tCountry\ns0.patient.media\n-\tGoDaddy.com, LLC\nOrganization: Egton Medical Information Systems Limited\nName Server: ns34.domaincontrol.com\nCreation Date: 2015-01-12T16:20:56}\n\n{https://www.anyxxxtube.net/search-porn/tsara-brashears/}\n{https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net}\n{wallpapers-nature.com}\n{https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian}",
          "modified": "2025-08-14T07:05:00.239000",
          "created": "2025-07-15T07:40:41.180000",
          "tags": [
            "url http",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "entries",
            "gmt etag",
            "server",
            "ecacc",
            "serving ip",
            "address",
            "dom dom",
            "data upload",
            "extraction",
            "pdf report",
            "enter",
            "failed",
            "extraction data",
            "enter sc",
            "type",
            "extra data",
            "extri please",
            "review data",
            "excluded tous",
            "tui sugges",
            "find",
            "show",
            "at filer",
            "iocs",
            "levelbluelabs",
            "please",
            "included iocs",
            "excluded io",
            "find suggested",
            "types",
            "domain data",
            "search",
            "o please",
            "manually add",
            "c data",
            "o suggesteo",
            "include data",
            "review uus",
            "u exclude",
            "find s",
            "indicaok data",
            "dom doman",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "copy",
            "push",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "pattern match",
            "ascii text",
            "size",
            "mitre att",
            "utf8",
            "null",
            "refresh",
            "body",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "discovery att"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3597,
            "FileHash-MD5": 343,
            "domain": 547,
            "hostname": 1222,
            "FileHash-SHA1": 343,
            "FileHash-SHA256": 4464,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 10518,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "249 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846860ee9b4faefae8d4cf9",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:58:22.091000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846860a0c5ff214f345717c",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:58:17.902000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468511340fb7ba8eeb7aae",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:54:09.116000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846850783baea1a6beb7e71",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. I won\u2019t be surprised if OTX cannot pull the threat. My account isn\u2019t allowing me full permissions. \n\n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:59.933000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468505ee31db44fe063e82",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:57.123000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468501eb091ae414509121",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:53.417000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468500f573317422968c7c",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:52.404000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "285 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6824aa10fa32899c33abc3be",
          "name": "tp://adorno.pl and http://vgt.pl INVESTIGATION requstor user Axelo",
          "description": "https://t.co/zTZNBTe8GV",
          "modified": "2025-06-14T00:00:30.956000",
          "created": "2025-05-14T14:34:56.497000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 426,
            "FileHash-SHA1": 455,
            "FileHash-SHA256": 5596,
            "URL": 15206,
            "IPv4": 409,
            "domain": 2473,
            "hostname": 5059,
            "CVE": 3
          },
          "indicator_count": 29627,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "310 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6692440efac39f5213329f13",
          "name": "Mustang Panda: Oxypumper | Ransom Suspicious verifier SpyTox",
          "description": "Mustang Panda is an alleged;China-based' non-governmental cyber espionage threat actor that was first observed in 2017. Targeting non-governmental civilians. Likely target is in many bot networks. Potential HoneyPot, this tool makes itself visible to target when researching the validity of an email or phone number. Notable for Gand Crane ransomware text embedded in SpyTox page image. Injection process observed. Affects most types of devices including iOS and Android. Critical issues found. IP's registrar's, domains 'not' contacted.\n\nHackers, harassment, cybercrime, cyber espionage.",
          "modified": "2024-08-12T08:04:00.041000",
          "created": "2024-07-13T09:08:30.431000",
          "tags": [
            "historical ssl",
            "referrer",
            "june",
            "october",
            "july",
            "hacker",
            "pe resource",
            "mustang panda",
            "plugx",
            "cryptbot",
            "threat roundup",
            "december",
            "process32nextw",
            "regsetvalueexa",
            "x00x00",
            "regdword",
            "memcommit",
            "high",
            "regbinary",
            "okrnserver",
            "regsetvalueexw",
            "download",
            "copy",
            "as15169 google",
            "united",
            "aaaa",
            "unknown",
            "gmt path",
            "passive dns",
            "search",
            "cname",
            "showing",
            "cookie",
            "ascii text",
            "pattern match",
            "error",
            "null",
            "typeerror",
            "sha1",
            "mitre att",
            "et tor",
            "known tor",
            "date",
            "infinity",
            "onload",
            "trident",
            "android",
            "void",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "generator",
            "third-party-cookies",
            "text/html",
            "trackers",
            "external-resources",
            "iframes",
            "entries",
            "status",
            "name servers",
            "urls",
            "next",
            "nxdomain",
            "susp",
            "a nxdomain",
            "domain",
            "win32",
            "as62597",
            "france unknown",
            "for privacy",
            "moved",
            "a domains",
            "meta",
            "gmt cache",
            "trojan",
            "creation date",
            "record value",
            "script urls",
            "as55293 a2",
            "as44273 host",
            "canada unknown",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "files",
            "ip address",
            "location canada",
            "443 ma2592000",
            "code",
            "trojanspy",
            "type",
            "ipv4",
            "twitter",
            "trojandropper",
            "find",
            "form",
            "less see",
            "formbook cnc",
            "checkin",
            "a li",
            "li ul",
            "cycbot",
            "emails",
            "as20940",
            "as54113",
            "asnone denmark",
            "worm",
            "asnone",
            "as4230 claro",
            "refloadapihash",
            "salicode",
            "div div",
            "wi fi",
            "orion wi",
            "orion",
            "a div",
            "div section",
            "orion logo",
            "target",
            "fast",
            "contact",
            "open",
            "virtool",
            "content type",
            "found",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ubuntu",
            "accept",
            "keepalive",
            "site",
            "find people",
            "numbers",
            "sptox",
            "utc google",
            "html info",
            "title spytox",
            "emails meta",
            "tags viewport",
            "spytox og",
            "type win32",
            "exe size",
            "mb first",
            "seen",
            "file name",
            "avg win32",
            "fortinet",
            "double click",
            "solutions",
            "domains",
            "sneaky server",
            "replacement",
            "unauthorized",
            "malware http",
            "core",
            "sim unlock",
            "emotet",
            "ta569",
            "critical",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 protector",
            "confuser",
            "confuserex",
            "checker",
            "samplename",
            "bonusbitcoin",
            "xslayer",
            "samplepath",
            "names",
            "details",
            "header intel",
            "name md5",
            "language",
            "contained",
            "rticon neutral",
            "ico rtgroupicon",
            "neutral",
            "assembly common",
            "clr version",
            "assembly name",
            "metadata header",
            "entry point",
            "rva entry",
            "strong name",
            "streams size",
            "entropy chi2",
            "ip detections",
            "country",
            "executable",
            "info header",
            "allmul vbaget4",
            "adjfprem ord",
            "data rtversion",
            "generic",
            "file type",
            "win32 exe",
            "kb file",
            "graph",
            "user",
            "windir",
            "downloads",
            "written c",
            "files deleted",
            "dropped c",
            "process",
            "logistics",
            "cyber defense",
            "brazzers",
            "tsara brashears",
            "gpt analyzer",
            "apple private",
            "data collection",
            "twitter andor",
            "snatch",
            "ransomware",
            "default",
            "rticon english",
            "type name",
            "data",
            "getfilesize",
            "getdc copyimage",
            "rticon russian",
            "pe32 executable",
            "borland delphi",
            "delphi generic",
            "dos borland",
            "hkcuclsid",
            "registry keys",
            "hkcrclsid",
            "file system",
            "settings c",
            "files c",
            "shared c",
            "sharedink c",
            "hostname",
            "as29791",
            "as8426 claranet",
            "malware",
            "network",
            "apple ios",
            "apple",
            "tmobile metro",
            "apeaksoft ios",
            "spybanker",
            "remcos",
            "adwind",
            "njrat",
            "guloader",
            "banload",
            "asyncrat",
            "arkeistealer",
            "danabot",
            "nordvpnsetup",
            "kb graph",
            "summary",
            "sharedinkarsa c",
            "sharedinkbgbg c",
            "sharedinkcscz c",
            "sharedinkdadk c",
            "gmt etag",
            "x amz",
            "body",
            "body html",
            "bq jul",
            "et trojan",
            "v4inhxvlhx0",
            "medium",
            "memreserve",
            "checks amount",
            "t1082",
            "module load",
            "e weowe64e",
            "edelepexe",
            "e rev",
            "weinedoewse net",
            "ransom",
            "show",
            "filehash",
            "related",
            "reverse dns",
            "haut",
            "servers",
            "pulse submit",
            "as3215 orange",
            "france",
            "backdoor",
            "paris",
            "honeypot",
            "python",
            "callback phishing",
            "teams",
            "porn related",
            "harassment"
          ],
          "references": [
            "https://www.spytox.com/ | Malicious Phone number & eMail verifier. HoneyPotNetBot?",
            "Alerts: disables_security network_icmp modifies_certificates modifies_proxy_wpad multiple_useragents injection_resumethread",
            "Antivirus Detections: Win.Malware.Oxypumper-6900445-0",
            "IDS Detections: Win32/QwertMiner CoinMiner Dropper CnC Checkin M2 | IDS Detections: Terse Named Filename EXE Download - Possibly Hostile",
            "IDS Detections: HTTP Executable Download from suspicious domain with direct request/fake browser (multiple families)",
            "IDS Detections: DNS Query for Suspicious .ml Domain | DNS Query for Suspicious .ga Domain | Domain External IP Lookup ip-api.com | Win32/QwertMiner Suspicious UA (jdlnb)",
            "Win.Malware.Oxypumper-6900445-0: FileHash-SHA1  05e520126ee1100c98263bfbd5a6ff0ce6ace4f7",
            "Win.Malware.Oxypumper-6900445-0: FileHash-MD5 2d84a619d4bd339f860cb48af0c9b6c8",
            "Win.Malware.Oxypumper-6900445-0: FileHash-SHA 256365ffde7df914840eb21c96f34c39912a4b031e3814b8e902b67acee6dff65a1",
            "Interesting: https://otx.alienvault.com/indicator/url/http://google.com.ge/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCoQFjAA&url=http%3A%2F%2Ft1t.us%2F&ei=9H0XU4rwPKXOygP_8IL4Bw&usg=AFQjCNEgQ29Mke-UahuBZ5wqWav04lFYvA&sig2=9-57Skjm2Hu4tg-e8iysQA&bvm=bv.62286460,d.bGQ",
            "google.com.ge , google.kiteflier.top, google.pf, google.com.ht, http://philsinstallation.com/, www.orion.area120.com ?, https://degoogle.xyz/feed/",
            "https://hybrid-analysis.com/sample/89fb2bccca6342d8fe50bd8b9763a6c829fd1bfe4fe2eccb251bd7e060f0d168/6691b5695751a70ec9041622",
            "Ransomware Detected: text artifact in screenshot indicates file may be ransomware details \"Antivirus\" (Source: screen_11.png, Indicator: \"virus\")",
            "scanning_hosts:  138.197.217.6,  IPv4 142.251.18.103, IPv4 142.251.31.99",
            "Backdoor:Win32/Plugx: FileHash-SHA256 a3ff97a0d338fd47e0af6822c4ee762491fc39028af984fe7ff8a1b6948fafe9",
            "Backdoor:Win32/Plugx: FileHash-MD5 63ebfbad26a529929927b9b485faa18a",
            "Antivirus Detections: Win32:TrojanX-gen\\ [Trj] , Win.Malware.Generickdz-6914893-0, Backdoor:Win32/Plugx",
            "Yara Detections: SUSP_NET_NAME_ConfuserEx , Delphi Alerts: network_icmp",
            "iPhone: 8.0.1.iphone.com.nextradiotv.bfmtv.adsenseformobileapps.com",
            "iPhone: 5.100.3.iphone.com.tranzmate.tranzmate1.adsenseformobileapps.com",
            "iPhone: 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com",
            "iPhone: 1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com",
            "iOS: http://www.au-petit-cafe-hollywood.com/guestbook/index.php?_sm_byp=iVVJNj4pQQp0ZsWB%3Eshowbox%20install%20iphone%3C/a%3E",
            "Interesting: www1.xxx.ddns.info | https://sgpelvicfloor.in/wp-admin/ZDCpqfZDmM5x9MxAaxxX/",
            "DotNET_Crypto_Obfuscator",
            "Antivirus Detections: ALF:HSTR:Adware:Win32/iBryte!bit ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47 ,  PWS:Win32/QQpass.B!MTB ,",
            "Antivirus Detections: Trojan:Win32/Bulta!rfn ,  TrojanDownloader:Win32/Cutwail ,  TrojanDropper:Win32/Loring ,  TrojanSpy:Win32/Nivdort.CB ,",
            "Antivirus Detections: TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA ,  TrojanSpy:Win32/Nivdort.DB ... ,  TrojanSpy:Win32/Nivdort.CB ,  TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA",
            "IDS Detections: Adware.iBryte.Z Checkin W32/iBryte.Adware Installer Download, Kazy/Kryptor/Cycbot Trojan Checkin 2,",
            "IDS Detections: FormBook CnC Checkin (GET) W32/iBryte.Adware Affiliate Campaign Executable Download ...",
            "https://otx.alienvault.com/indicator/ip/216.40.34.41",
            "Checker By X-SLAYER.exe: 74ca7f6f723a57dc22625eb26214f85689216859388c1f93503728dae8929b97",
            "ns2.tsaratsovo.net",
            "FormBook: FileHash-SHA256 d329608064b13006e73309a6f6a819b6bc1392b80ad01946d04719da0b680955",
            "FormBook: FileHash-SHA1 205a7931e145b05ac6040690d7a2b862b4a1ec79",
            "FormBook: FileHash-MD5 FileHash-MD5 60b8487a9ddc166fbae45d611a0b6848",
            "DotNET_Crypto_Obfuscator",
            "Antivirus Detections: Win32:MalwareX-gen\\ [Trj]",
            "IDS Detections: FormBook CnC Checkin (GET) 403 Forbidden Yara Detections: MAL_RANSOM_COVID19_Apr20_1 ,  DotNET_DotFuscator",
            "Alerts: nids_malware_alert injection_runpe network_icmp network_cnc_http network_http allocates_rwx",
            "Alerts: antisandbox_sleep creates_exe privilege_luid_check checks_debugger",
            "https://otx.alienvault.com/indicator/file/1c954b67c62b161d839434243ebe4b9dfe2b790a91eb968ecbfbfae53a414e29",
            "Antivirus Detections: Win32:MalwareX-gen\\ [Trj] ,  Win.Ransomware.Gandcrab-9967304-0 ,  Ransom:Win32/GandCrab.AE",
            "Yara Detections ReflectiveLoader ,  Win32_Ransomware_GandCrab ,  stack_string",
            "Ransom:Win32/GandCrab.AE: FileHash-SHA256 941ea65563f1b06080075ccafa8180118f65f3c8a4cca038654f0aba5cd0f5fc",
            "Ransom:Win32/GandCrab.AE: FileHash-SHA1 fe29cb8324de15bccfe5055a65ea36141fb794c9",
            "Ransom:Win32/GandCrab.AE: FileHash-MD5 f72bcc0d841008c1e8250a3df1182fd5",
            "1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com. 2.android.com.vance.advanced.tubevanced.adsenseformobileapps.com",
            "mobileview.page, 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com,",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
            "https://www.YouTube.com/polebote"
          ],
          "public": 1,
          "adversary": "Mustang Panda",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Oxypumper-6900445-0",
              "display_name": "Win.Malware.Oxypumper-6900445-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx",
              "display_name": "Backdoor:Win32/Plugx",
              "target": "/malware/Backdoor:Win32/Plugx"
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "TrojanDropper:Win32/Tofsee",
              "display_name": "TrojanDropper:Win32/Tofsee",
              "target": "/malware/TrojanDropper:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 71,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 568,
            "FileHash-SHA1": 537,
            "FileHash-SHA256": 4887,
            "URL": 4773,
            "domain": 2346,
            "hostname": 1884,
            "SSLCertFingerprint": 15,
            "email": 16,
            "CVE": 1
          },
          "indicator_count": 15027,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 235,
          "modified_text": "616 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d0a9c7f1b04296d9b0d803",
          "name": "History Killer Pro Injection deleting VirusTotal & OTX.AlienVault Pulses",
          "description": "",
          "modified": "2024-03-18T04:01:27.756000",
          "created": "2024-02-17T12:42:47.334000",
          "tags": [
            "contacted",
            "execution",
            "january",
            "september",
            "whois record",
            "resolutions",
            "communicating",
            "roundup",
            "highly targeted",
            "phishing",
            "quasar",
            "malware",
            "open",
            "threat roundup",
            "referrer",
            "remote",
            "kimsuky",
            "passive dns",
            "urls",
            "dive domains",
            "creation date",
            "search",
            "record value",
            "date",
            "united",
            "scan endpoints",
            "all scoreblue",
            "unknown",
            "body",
            "brian sabey",
            "hall render",
            "reinsurance",
            "state",
            "danger",
            "threat",
            "critical",
            "crypthashdata",
            "read c",
            "tcmiheijkmutcix",
            "entries",
            "show",
            "t1055",
            "intel",
            "ms windows",
            "delphi",
            "win32",
            "copy",
            "write",
            "injection",
            "zusy",
            "neojit",
            "cyber stalking",
            "worker",
            "inject",
            "illegal",
            "tampering",
            "hijacker",
            "delete",
            "ret hat",
            "stalker",
            "shadow",
            "quasi"
          ],
          "references": [
            "www.historykillerpro.com",
            "https://otx.alienvault.com/indicator/hostname/ww25.historykillerpro.com",
            "http://sniper.debugger.ru",
            "Remote sharing: https://otx.alienvault.com/otxapi/indicators/file/screenshot/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
            "Inject & attack: https://otx.alienvault.com/indicator/file/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
            "M. Brian Sabey Hall Render , Denver, Co | Frankfurt, Germany"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Variant.Zusy.572 Checkin",
              "display_name": "Variant.Zusy.572 Checkin",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Neojit.A",
              "display_name": "TrojanDownloader:Win32/Neojit.A",
              "target": "/malware/TrojanDownloader:Win32/Neojit.A"
            },
            {
              "id": "Win32:Delf-SES\\ [Trj]",
              "display_name": "Win32:Delf-SES\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1372316",
              "display_name": "Win.Trojan.Agent-1372316",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65d053a935bf99f5263deb57",
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1915,
            "FileHash-MD5": 437,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 3054,
            "domain": 987,
            "URL": 5902,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 12732,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "763 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d053a935bf99f5263deb57",
          "name": "History Killer Pro Injection deleting virustotal & otx.alienvault Pulses",
          "description": "History killer pro, is being used to delete and modify virustotal nodes and 41 otx.alienvault pulses. Junk data is being used to fill in missing pulses.\nTargeted: 1 callmeDoris  several scoreblue (sometimes I clone pulses) Octoseek.  \npulses.\nHallrender, Metro by T-Mobile, https://myaccount.uscis.gov/, Esurance,  40 pule reports are regarding Tsara Brashears cyber bully campaign which attacked the corporates mentioned except 2 AIG and Hallrender attackers. 100's of other modifications, deletions by another tool affecting several users.",
          "modified": "2024-03-18T04:01:27.756000",
          "created": "2024-02-17T06:35:21.666000",
          "tags": [
            "contacted",
            "execution",
            "january",
            "september",
            "whois record",
            "resolutions",
            "communicating",
            "roundup",
            "highly targeted",
            "phishing",
            "quasar",
            "malware",
            "open",
            "threat roundup",
            "referrer",
            "remote",
            "kimsuky",
            "passive dns",
            "urls",
            "dive domains",
            "creation date",
            "search",
            "record value",
            "date",
            "united",
            "scan endpoints",
            "all scoreblue",
            "unknown",
            "body",
            "brian sabey",
            "hall render",
            "reinsurance",
            "state",
            "danger",
            "threat",
            "critical",
            "crypthashdata",
            "read c",
            "tcmiheijkmutcix",
            "entries",
            "show",
            "t1055",
            "intel",
            "ms windows",
            "delphi",
            "win32",
            "copy",
            "write",
            "injection",
            "zusy",
            "neojit",
            "cyber stalking",
            "worker",
            "inject",
            "illegal",
            "tampering",
            "hijacker",
            "delete",
            "ret hat",
            "stalker",
            "shadow",
            "quasi"
          ],
          "references": [
            "www.historykillerpro.com",
            "https://otx.alienvault.com/indicator/hostname/ww25.historykillerpro.com",
            "http://sniper.debugger.ru",
            "Remote sharing: https://otx.alienvault.com/otxapi/indicators/file/screenshot/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
            "Inject & attack: https://otx.alienvault.com/indicator/file/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
            "M. Brian Sabey Hall Render , Denver, Co | Frankfurt, Germany"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Variant.Zusy.572 Checkin",
              "display_name": "Variant.Zusy.572 Checkin",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Neojit.A",
              "display_name": "TrojanDownloader:Win32/Neojit.A",
              "target": "/malware/TrojanDownloader:Win32/Neojit.A"
            },
            {
              "id": "Win32:Delf-SES\\ [Trj]",
              "display_name": "Win32:Delf-SES\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1372316",
              "display_name": "Win.Trojan.Agent-1372316",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1915,
            "FileHash-MD5": 437,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 3054,
            "domain": 987,
            "URL": 5902,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 12732,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "763 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659331589faf01b909c1802d",
          "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
          "description": "",
          "modified": "2024-01-31T14:03:30.344000",
          "created": "2024-01-01T21:40:40.413000",
          "tags": [
            "maxads0",
            "kld1063",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls http",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "march",
            "communicating",
            "copy",
            "january",
            "collections",
            "execution",
            "malware",
            "startpage",
            "malicious",
            "ransomware",
            "agent tesla",
            "attack",
            "android",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "windir",
            "path",
            "programfiles",
            "pe32",
            "ms windows",
            "getprocaddress",
            "file type",
            "mitre att",
            "ck id",
            "show technique",
            "win64",
            "date",
            "open",
            "hybrid",
            "cookie",
            "tracking",
            "apple",
            "spyware",
            "malware",
            "tablet",
            "superwebbysearch",
            "hallrender",
            "pegasus",
            "briansabey",
            "aig",
            "abuse",
            "tulach"
          ],
          "references": [
            "findbetterresults.com",
            "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
            "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
            "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
            "www2.megawebfind.com                [command_and_control]",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2368,
            "FileHash-SHA256": 4539,
            "hostname": 2892,
            "URL": 9741,
            "FileHash-MD5": 836,
            "FileHash-SHA1": 461,
            "CVE": 1
          },
          "indicator_count": 20838,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "810 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659331580cd1571f730b8de2",
          "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
          "description": "",
          "modified": "2024-01-31T14:03:30.344000",
          "created": "2024-01-01T21:40:40.242000",
          "tags": [
            "maxads0",
            "kld1063",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls http",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "march",
            "communicating",
            "copy",
            "january",
            "collections",
            "execution",
            "malware",
            "startpage",
            "malicious",
            "ransomware",
            "agent tesla",
            "attack",
            "android",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "windir",
            "path",
            "programfiles",
            "pe32",
            "ms windows",
            "getprocaddress",
            "file type",
            "mitre att",
            "ck id",
            "show technique",
            "win64",
            "date",
            "open",
            "hybrid",
            "cookie",
            "tracking",
            "apple",
            "spyware",
            "malware",
            "tablet",
            "superwebbysearch",
            "hallrender",
            "pegasus",
            "briansabey",
            "aig",
            "abuse",
            "tulach"
          ],
          "references": [
            "findbetterresults.com",
            "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
            "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
            "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
            "www2.megawebfind.com                [command_and_control]",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2368,
            "FileHash-SHA256": 4539,
            "hostname": 2892,
            "URL": 9741,
            "FileHash-MD5": 836,
            "FileHash-SHA1": 461,
            "CVE": 1
          },
          "indicator_count": 20838,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "810 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ca3f53717bb3a25e96065",
          "name": "Hijacking | Typosquatting | Masquerading Shared Modules | http://ww1.thecoolzipextractorapp.com/ via https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-01-26T01:05:54.754000",
          "created": "2023-12-27T22:23:49.562000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "maltiverse",
            "dinkle threat",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "communicating",
            "whois whois",
            "siblings parent",
            "execution"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "658b9e86f7a149333882bfb9",
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12134,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 101,
            "FileHash-SHA256": 3982,
            "hostname": 2878,
            "domain": 2159,
            "CVE": 1
          },
          "indicator_count": 21357,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "815 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b9e86f7a149333882bfb9",
          "name": "Hijacking | Typosquatting | Masquerading Shared Modules",
          "description": "*Shared Modules\t\nExecution\nAdversaries may execute malicious payloads via loading shared modules.\n\n*Masquerading\t\nDefense Evasion\nAdversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.\n\nComponent Object Model Hijacking\t\nPersistence\nPrivilege Escalation\nAdversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.\nPulse: http://ww1.thecoolzipextractorapp.com/\nFound in: https://www.hallrender.com/attorney/brian-sabey/",
          "modified": "2024-01-26T01:05:54.754000",
          "created": "2023-12-27T03:48:22.319000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "maltiverse",
            "dinkle threat",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "communicating",
            "whois whois",
            "siblings parent",
            "execution"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12134,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 101,
            "FileHash-SHA256": 3982,
            "hostname": 2878,
            "domain": 2159,
            "CVE": 1
          },
          "indicator_count": 21357,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "815 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655af35616dbd4781c681948",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-20T05:49:10.586000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655a13e4538e896c00f2077e",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655a13e4538e896c00f2077e",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "This report is generated by MITRE ATT&CK\u2122 and produced by the team at the University of California, San Francisco, and is available on the web, via the Microsoft Research website.\nTulach, 114.114.114.114, spyware, phishing, fraud, malvertizing, password cracker, iPhone unlocker, malicious, media sharing, miscellaneous attacks.",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-19T13:55:48.898000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655aef8a8cc2e0929f2aa5ea",
          "name": "Python Initiated Connection | Spyware | Remote Attacks |",
          "description": "",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-20T05:32:58.400000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655950034e6ae4650a6b02ce",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655950034e6ae4650a6b02ce",
          "name": "Python Initiated Connection | Spyware |  Remote Attacks  |  | Part 4",
          "description": "Apple, Mac, iOS, phishing, frauds services, malware, trojan.allesgreh/trojan.allesgreh/respat, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and possibly others. Python Initiated Connection, WScriptShell_Case_Anomaly.\nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-19T00:00:03.258000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b9da2479892590b77a",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:37.411000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b4d8c905f4475d8bcc",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:32.856000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65575839f772f9f944f7af94",
          "name": "Command and Scripting Interpreter | www.supernetforme.com",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T12:10:33.958000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "communicating",
            "referrer",
            "june",
            "july",
            "october",
            "historical ssl",
            "malware",
            "august",
            "path",
            "treatas",
            "hkcuclsid",
            "document file",
            "v2 document",
            "sha256",
            "ascii text",
            "size",
            "type data",
            "html document",
            "february",
            "hybrid",
            "general",
            "local",
            "factory",
            "click",
            "strings",
            "pattern match",
            "root ca",
            "authority",
            "class",
            "script",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "date",
            "error",
            "unknown",
            "generator",
            "critical",
            "body",
            "info",
            "trace",
            "void",
            "c2",
            "trojan",
            "parked domain",
            "registrar abuse",
            "tracking",
            "deep search",
            "command_and_control"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "AI Packer",
              "display_name": "AI Packer",
              "target": null
            },
            {
              "id": "Trojan",
              "display_name": "Trojan",
              "target": null
            },
            {
              "id": "Banto",
              "display_name": "Banto",
              "target": null
            },
            {
              "id": "Matrix",
              "display_name": "Matrix",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 368,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 76,
            "FileHash-SHA256": 1015,
            "URL": 1639,
            "domain": 329
          },
          "indicator_count": 3508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "google.com.ge , google.kiteflier.top, google.pf, google.com.ht, http://philsinstallation.com/, www.orion.area120.com ?, https://degoogle.xyz/feed/",
        "iPhone: 8.0.1.iphone.com.nextradiotv.bfmtv.adsenseformobileapps.com",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Subject: DE Certificate Subject: Berlin Certificate Subject",
        "IDS Detections: FormBook CnC Checkin (GET) 403 Forbidden Yara Detections: MAL_RANSOM_COVID19_Apr20_1 ,  DotNET_DotFuscator",
        "M. Brian Sabey Hall Render , Denver, Co | Frankfurt, Germany",
        "http://netuser.joymeng.com/charge_apple/notify",
        "Alerts: disables_security network_icmp modifies_certificates modifies_proxy_wpad multiple_useragents injection_resumethread",
        "Backdoor:Win32/Plugx: FileHash-MD5 63ebfbad26a529929927b9b485faa18a",
        "Backdoor:Win32/Plugx: FileHash-SHA256 a3ff97a0d338fd47e0af6822c4ee762491fc39028af984fe7ff8a1b6948fafe9",
        "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
        "IDS Detections: FormBook CnC Checkin (GET) W32/iBryte.Adware Affiliate Campaign Executable Download ...",
        "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
        "IDS Detections: HTTP Executable Download from suspicious domain with direct request/fake browser (multiple families)",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
        "ns2.tsaratsovo.net",
        "iPhone: 5.100.3.iphone.com.tranzmate.tranzmate1.adsenseformobileapps.com",
        "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
        "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
        "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
        "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
        "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
        "http://sniper.debugger.ru",
        "https://www.passcreator.com/en/apple-wallet-passes",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "IDS Detections: Adware.iBryte.Z Checkin W32/iBryte.Adware Installer Download, Kazy/Kryptor/Cycbot Trojan Checkin 2,",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "scanning_hosts:  138.197.217.6,  IPv4 142.251.18.103, IPv4 142.251.31.99",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
        "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
        "apple-business.cancom.at",
        "DotNET_Crypto_Obfuscator",
        "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
        "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
        "IDS Detections: Win32/QwertMiner CoinMiner Dropper CnC Checkin M2 | IDS Detections: Terse Named Filename EXE Download - Possibly Hostile",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "Antivirus Detections: Win.Malware.Oxypumper-6900445-0",
        "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
        "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
        "www.historykillerpro.com",
        "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/",
        "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283",
        "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
        "Yara Detections ReflectiveLoader ,  Win32_Ransomware_GandCrab ,  stack_string",
        "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
        "Antivirus Detections: Trojan:Win32/Bulta!rfn ,  TrojanDownloader:Win32/Cutwail ,  TrojanDropper:Win32/Loring ,  TrojanSpy:Win32/Nivdort.CB ,",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "FormBook: FileHash-MD5 FileHash-MD5 60b8487a9ddc166fbae45d611a0b6848",
        "Antivirus Detections: ALF:HSTR:Adware:Win32/iBryte!bit ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47 ,  PWS:Win32/QQpass.B!MTB ,",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "FormBook: FileHash-SHA256 d329608064b13006e73309a6f6a819b6bc1392b80ad01946d04719da0b680955",
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "Interesting: www1.xxx.ddns.info | https://sgpelvicfloor.in/wp-admin/ZDCpqfZDmM5x9MxAaxxX/",
        "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA1 fe29cb8324de15bccfe5055a65ea36141fb794c9",
        "Inject & attack: https://otx.alienvault.com/indicator/file/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
        "Win.Malware.Oxypumper-6900445-0: FileHash-MD5 2d84a619d4bd339f860cb48af0c9b6c8",
        "Ransomware Detected: text artifact in screenshot indicates file may be ransomware details \"Antivirus\" (Source: screen_11.png, Indicator: \"virus\")",
        "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj] ,  Win.Ransomware.Gandcrab-9967304-0 ,  Ransom:Win32/GandCrab.AE",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
        "Ransom:Win32/GandCrab.AE: FileHash-MD5 f72bcc0d841008c1e8250a3df1182fd5",
        "Alerts: antisandbox_sleep creates_exe privilege_luid_check checks_debugger",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj]",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA256 941ea65563f1b06080075ccafa8180118f65f3c8a4cca038654f0aba5cd0f5fc",
        "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
        "Remote sharing: https://otx.alienvault.com/otxapi/indicators/file/screenshot/dd846d74613d6285125886d35abb1bd261a5fc1b6bc0ba6e28e881f73dba23b7",
        "Yara Detections: SUSP_NET_NAME_ConfuserEx , Delphi Alerts: network_icmp",
        "https://hybrid-analysis.com/sample/89fb2bccca6342d8fe50bd8b9763a6c829fd1bfe4fe2eccb251bd7e060f0d168/6691b5695751a70ec9041622",
        "mobileview.page, 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com,",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA1  05e520126ee1100c98263bfbd5a6ff0ce6ace4f7",
        "https://www.YouTube.com/polebote",
        "Checker By X-SLAYER.exe: 74ca7f6f723a57dc22625eb26214f85689216859388c1f93503728dae8929b97",
        "IDS Detections: DNS Query for Suspicious .ml Domain | DNS Query for Suspicious .ga Domain | Domain External IP Lookup ip-api.com | Win32/QwertMiner Suspicious UA (jdlnb)",
        "findbetterresults.com",
        "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
        "https://otx.alienvault.com/indicator/ip/216.40.34.41",
        "Antivirus Detections: Win32:TrojanX-gen\\ [Trj] , Win.Malware.Generickdz-6914893-0, Backdoor:Win32/Plugx",
        "www2.megawebfind.com                [command_and_control]",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
        "Apple - 162.55.158.153",
        "Alerts: nids_malware_alert injection_runpe network_icmp network_cnc_http network_http allocates_rwx",
        "iPhone: 1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com",
        "iPhone: 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com",
        "https://www.spytox.com/ | Malicious Phone number & eMail verifier. HoneyPotNetBot?",
        "https://otx.alienvault.com/indicator/file/1c954b67c62b161d839434243ebe4b9dfe2b790a91eb968ecbfbfae53a414e29",
        "FormBook: FileHash-SHA1 205a7931e145b05ac6040690d7a2b862b4a1ec79",
        "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys",
        "iOS: http://www.au-petit-cafe-hollywood.com/guestbook/index.php?_sm_byp=iVVJNj4pQQp0ZsWB%3Eshowbox%20install%20iphone%3C/a%3E",
        "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
        "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
        "1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com. 2.android.com.vance.advanced.tubevanced.adsenseformobileapps.com",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "Interesting: https://otx.alienvault.com/indicator/url/http://google.com.ge/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCoQFjAA&url=http%3A%2F%2Ft1t.us%2F&ei=9H0XU4rwPKXOygP_8IL4Bw&usg=AFQjCNEgQ29Mke-UahuBZ5wqWav04lFYvA&sig2=9-57Skjm2Hu4tg-e8iysQA&bvm=bv.62286460,d.bGQ",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA 256365ffde7df914840eb21c96f34c39912a4b031e3814b8e902b67acee6dff65a1",
        "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
        "Antivirus Detections: TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA ,  TrojanSpy:Win32/Nivdort.DB ... ,  TrojanSpy:Win32/Nivdort.CB ,  TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA",
        "https://otx.alienvault.com/indicator/hostname/ww25.historykillerpro.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Mustang Panda"
          ],
          "malware_families": [
            "Alf:hstr:trojandownloader:win32/purityscan.a!bit",
            "Win.malware.sfwx-9853337-0",
            "Gc",
            "Trojan:win32/blihan.a",
            "Pws:win32/qqpass",
            "Wormwin32/mofksys.rnd!mtb",
            "Toga!rfn",
            "Trojandropper:win32/tofsee",
            "Win.trojan.fraudpack",
            "Cve 2007695",
            "Variant.zusy.572 checkin",
            "Ai packer",
            "Worm:win32/autorun",
            "Trojan:win32/qqpass",
            "Fakeav",
            "Trojan:win32/kaicorn!rf",
            "Win.malware.oxypumper-6900445-0",
            "Trojan",
            "Trojan:win32/floxif.e",
            "Floxif",
            "Win.trojan.generic",
            "Trojandropper:win32/vb.il",
            "Tel:msil/dlsocconsend",
            "Tofsee",
            "Win32:androp",
            "Win.downloader.unruy-10026469-0",
            "Win32:banker",
            "Win32:malob-bx\\ [cryp]",
            "Win.trojan.cycler-47",
            "Win32/trickler",
            "Backdoor:win32/plugx",
            "Worm:win32/cambot!rfn",
            "Unruy",
            "Win.trojan.zegost",
            "Win.malware.barys-6840738-0",
            "Win.trojan.agent-1372316",
            "Ransom:msil/genasom.i",
            "Trojan:win32/aenjaris.al!bit",
            "Crypt2.azdi",
            "#lowfi:tool:win32/vbstoexev2e",
            "Trojandropper:win32/muldrop.v!mtb",
            "Trojan:win32/eyestye.t",
            "Win.malware.urelas",
            "Trojan:win32/agent.ag!mtb",
            "Trojan:win32/glupteba.mt!mtb",
            "Ransomware",
            "Ransom:win32/gandcrab.ae",
            "Virtool:win32/obfuscator.ki",
            "Trojan:win32/salgorea.c!mtb",
            "Ddos:linux/lightaidra",
            "Malware",
            "Trojan:win32/salgorea",
            "Win.malware.remoteadmin-7056666-0",
            "Worm:win32/yuner.a",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Pws:win32/qqpass.b!mtb",
            "Agent tesla",
            "Win32:malware",
            "#lowfi:suspicioussectionname",
            "Trojandownloader:win32/neojit.a",
            "Cycbot",
            "Win.malware.zusy",
            "Androp",
            "Win.dropper.unruy-9994363-0",
            "Win.dropper.tiggre-9845940-0",
            "Worm:win32/autorun.xfv",
            "Alf:heraklezeval:pws:win32/qqpass!rfn",
            "Win.malware.midie-6847892-0",
            "Trojanspy",
            "Inject.brdv",
            "Win.trojan.clicker-3506",
            "Win.malware.eclz-9953021-0",
            "Win32:delf-ses\\ [trj]",
            "Win.malware.hd0kzai-9985588-0",
            "Matrix",
            "Banto",
            "Backdoor:win32/tofsee.t",
            "Et"
          ],
          "industries": [],
          "unique_indicators": 178699
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/google.off.ai",
    "whois": "http://whois.domaintools.com/google.off.ai",
    "domain": "google.off.ai",
    "hostname": "adservice.google.off.ai"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 28,
  "pulses": [
    {
      "id": "69aa0a62f94a92b5168405c2",
      "name": "fedpaypal clone Q vashti",
      "description": "",
      "modified": "2026-03-06T06:39:27.872000",
      "created": "2026-03-05T22:57:38.559000",
      "tags": [
        "present sep",
        "virtool",
        "cryp",
        "win32",
        "ip address",
        "trojan",
        "ransom",
        "asn as54113",
        "passive dns",
        "msil",
        "united states",
        "dynamicloader",
        "qaeaav12",
        "high",
        "qbeipbdii",
        "write",
        "paypal",
        "medium",
        "search",
        "vmware",
        "floodfix",
        "malware",
        "united",
        "mtb apr",
        "hostname add",
        "write c",
        "read c",
        "yara detections",
        "upxoepplace",
        "next",
        "markus",
        "april",
        "ping",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "443 ma2592000",
        "ipv4 add",
        "url analysis",
        "urls",
        "body",
        "title",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "status",
        "name servers",
        "set cookie",
        "script urls",
        "present feb",
        "cookie",
        "template",
        "present oct",
        "present jul",
        "present dec",
        "present jun",
        "next associated",
        "urls show",
        "date checked",
        "present apr",
        "url hostname",
        "united kingdom",
        "unknown ns",
        "servers",
        "great britain",
        "msr aug",
        "msr apr",
        "msr nov",
        "ite o",
        "server response",
        "script script",
        "files show",
        "date hash",
        "avast avg",
        "creation date",
        "lcid1033",
        "sminnotek",
        "spnvirtualbox",
        "bvvirtualbox",
        "present mar",
        "present nov",
        "exploit",
        "error",
        "server response",
        "google safe",
        "results sep",
        "backdoor",
        "certificate",
        "mtb sep",
        "next http",
        "scans show",
        "present may",
        "results jun",
        "results jan",
        "worm",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "ids detections",
        "cape",
        "viking",
        "philis",
        "et",
        "torop",
        "des moines",
        "contacted hosts",
        "content reputation",
        "sabey type",
        "tulach type",
        "rexx type",
        "foundry type",
        "fred scherr",
        "twitter",
        "apple",
        "monitored target",
        "financial theft",
        "psalms 27: 1 - 14"
      ],
      "references": [
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fraudpack",
          "display_name": "Win.Trojan.Fraudpack",
          "target": null
        },
        {
          "id": "Fakeav",
          "display_name": "Fakeav",
          "target": null
        },
        {
          "id": "Ransom:MSIL/Genasom.I",
          "display_name": "Ransom:MSIL/Genasom.I",
          "target": "/malware/Ransom:MSIL/Genasom.I"
        },
        {
          "id": "Virtool:Win32/Obfuscator.KI",
          "display_name": "Virtool:Win32/Obfuscator.KI",
          "target": "/malware/Virtool:Win32/Obfuscator.KI"
        },
        {
          "id": "Toga!rfn",
          "display_name": "Toga!rfn",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Remoteadmin-7056666-0",
          "display_name": "Win.Malware.Remoteadmin-7056666-0",
          "target": null
        },
        {
          "id": "Floxif",
          "display_name": "Floxif",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Dropper.Unruy-9994363-0",
          "display_name": "Win.Dropper.Unruy-9994363-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Cycler-47",
          "display_name": "Win.Trojan.Cycler-47",
          "target": null
        },
        {
          "id": "Win.Trojan.Clicker-3506",
          "display_name": "Win.Trojan.Clicker-3506",
          "target": null
        },
        {
          "id": "Win.Downloader.Unruy-10026469-0",
          "display_name": "Win.Downloader.Unruy-10026469-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Urelas",
          "display_name": "Win.Malware.Urelas",
          "target": null
        },
        {
          "id": "Win.Malware.Zusy",
          "display_name": "Win.Malware.Zusy",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "target": null
        },
        {
          "id": "Win.Malware.Eclz-9953021-0",
          "display_name": "Win.Malware.Eclz-9953021-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "target": null
        },
        {
          "id": "Win.Dropper.Tiggre-9845940-0",
          "display_name": "Win.Dropper.Tiggre-9845940-0",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Win.Malware.Sfwx-9853337-0",
          "display_name": "Win.Malware.Sfwx-9853337-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Trojan:Win32/Kaicorn!rf",
          "display_name": "Trojan:Win32/Kaicorn!rf",
          "target": "/malware/Trojan:Win32/Kaicorn!rf"
        },
        {
          "id": "Win32:Banker",
          "display_name": "Win32:Banker",
          "target": null
        },
        {
          "id": "Worm:Win32/Cambot!rfn",
          "display_name": "Worm:Win32/Cambot!rfn",
          "target": "/malware/Worm:Win32/Cambot!rfn"
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847892-0",
          "display_name": "Win.Malware.Midie-6847892-0",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1595.002",
          "name": "Vulnerability Scanning",
          "display_name": "T1595.002 - Vulnerability Scanning"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68c5743593a4bcc81dd94b0b",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1323,
        "URL": 4360,
        "FileHash-MD5": 759,
        "FileHash-SHA1": 748,
        "FileHash-SHA256": 5148,
        "domain": 1076,
        "email": 7
      },
      "indicator_count": 13421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "45 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6940b852c28f2a2c6abb4aad",
      "name": "FRITZ!Box \u2026.Connecting to Apple devices",
      "description": "Connecting to targeted Apple\ndevices overnight. \n\nHow to connect to the FRITZ!Box, how to access all of the product's functions, and what to do with the device if you are not connected to it in your home network.",
      "modified": "2026-01-15T01:02:47.757000",
      "created": "2025-12-16T01:39:30.381000",
      "tags": [
        "fritz",
        "strong",
        "main navigation",
        "deutsch",
        "englisch",
        "funktionen der",
        "verbindung zur",
        "wifi",
        "ip address",
        "box avm",
        "lowfi",
        "win32",
        "susp",
        "urls",
        "files",
        "asn as44716",
        "related tags",
        "indicator facts",
        "germany unknown",
        "a domains",
        "meta",
        "typo3",
        "body doctype",
        "kasper skaarhoj",
        "gmt server",
        "pragma",
        "a nxdomain",
        "nxdomain",
        "whitelisted",
        "present aug",
        "present jul",
        "present oct",
        "present jun",
        "united",
        "present sep",
        "present nov",
        "next http",
        "scans show",
        "title",
        "div div",
        "a li",
        "wir suchen",
        "li ul",
        "avm karriere",
        "dich a",
        "reverse dns",
        "berlin",
        "germany asn",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "related pulses",
        "none related",
        "passive dns",
        "ipv4",
        "url analysis",
        "present dec",
        "moved",
        "certificate",
        "vertriebs gmbh",
        "aaaa",
        "as12732 gutcon",
        "domain",
        "hostname",
        "verdict",
        "files ip",
        "address",
        "germany",
        "as13335",
        "as8220 colt",
        "present may",
        "united kingdom",
        "regsetvalueexa",
        "regdword",
        "regbinary",
        "show",
        "yara detections",
        "regsetvalueexw",
        "regsz",
        "medium",
        "suspicious",
        "delphi",
        "malware",
        "write",
        "as6878",
        "msie",
        "chrome",
        "gmt content",
        "germany showing",
        "createobject",
        "set http",
        "search",
        "high",
        "read c",
        "et trojan",
        "jfif",
        "ascii text",
        "detected",
        "trojan generic",
        "checkin",
        "pony downloader",
        "http library",
        "virustotal",
        "riskware",
        "mcafee",
        "drweb",
        "vipre",
        "trojan",
        "panda",
        "next",
        "unknown",
        "as15169 google",
        "status",
        "name servers",
        "record value",
        "emails",
        "error",
        "trojandropper",
        "results dec",
        "ddos",
        "worm",
        "mtb trojan",
        "mtb apr",
        "exev2e",
        "ia256",
        "extraction",
        "get http",
        "post http",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "informative",
        "spawns",
        "mitre att",
        "ck techniques",
        "evasion att",
        "germany germany",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "show technique",
        "ck matrix",
        "show process",
        "network traffic",
        "t1057",
        "t1071",
        "hybrid",
        "local",
        "path",
        "t1204 user",
        "defense evasion",
        "t1480 execution",
        "sha1",
        "sha256",
        "size",
        "script",
        "null",
        "span",
        "refresh",
        "footer",
        "body",
        "june",
        "general",
        "click",
        "strings",
        "tools",
        "tracker",
        "code",
        "look",
        "verify",
        "restart",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "process details",
        "flag",
        "link",
        "present feb",
        "servers",
        "redacted for",
        "as20546 soprado",
        "encrypt",
        "mtb sep",
        "ransom",
        "next associated",
        "twitter",
        "virtool",
        "hostname add",
        "location russia",
        "as200350",
        "russia unknown",
        "federation flag",
        "ipv4 add",
        "asn as200350",
        "related",
        "domain add",
        "unknown ns",
        "expiration date",
        "http version",
        "windows nt",
        "gbot",
        "post method",
        "port",
        "destination",
        "delete",
        "get na",
        "as15169",
        "expiration",
        "url https",
        "no expiration",
        "showing",
        "entries",
        "url add",
        "pulse pulses",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "unknown cname",
        "cname",
        "asn as24940",
        "less",
        "date",
        "pulse submit"
      ],
      "references": [
        "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
        "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
        "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
        "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
        "Subject: DE Certificate Subject: Berlin Certificate Subject",
        "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
        "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
        "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
        "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
        "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
        "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
        "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
        "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
        "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
        "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
        "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
        "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
        "http://netuser.joymeng.com/charge_apple/notify",
        "https://www.passcreator.com/en/apple-wallet-passes",
        "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
        "apple-business.cancom.at",
        "Apple - 162.55.158.153",
        "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
        "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283",
        "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
        "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
        "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "#LowFi:Tool:Win32/VbsToExeV2E",
          "display_name": "#LowFi:Tool:Win32/VbsToExeV2E",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Androp",
          "display_name": "Androp",
          "target": null
        },
        {
          "id": "Inject.BRDV",
          "display_name": "Inject.BRDV",
          "target": null
        },
        {
          "id": "Win32:Androp",
          "display_name": "Win32:Androp",
          "target": null
        },
        {
          "id": "Crypt2.AZDI",
          "display_name": "Crypt2.AZDI",
          "target": null
        },
        {
          "id": "TEL:MSIL/DlSocConSend",
          "display_name": "TEL:MSIL/DlSocConSend",
          "target": "/malware/TEL:MSIL/DlSocConSend"
        },
        {
          "id": "DDOS:Linux/Lightaidra",
          "display_name": "DDOS:Linux/Lightaidra",
          "target": "/malware/DDOS:Linux/Lightaidra"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "Trojan:Win32/Salgorea.C!MTB",
          "display_name": "Trojan:Win32/Salgorea.C!MTB",
          "target": "/malware/Trojan:Win32/Salgorea.C!MTB"
        },
        {
          "id": "Worm:Win32/Autorun.XFV",
          "display_name": "Worm:Win32/Autorun.XFV",
          "target": "/malware/Worm:Win32/Autorun.XFV"
        },
        {
          "id": "Trojan:Win32/Blihan.A",
          "display_name": "Trojan:Win32/Blihan.A",
          "target": "/malware/Trojan:Win32/Blihan.A"
        },
        {
          "id": "Worm:Win32/Yuner.A",
          "display_name": "Worm:Win32/Yuner.A",
          "target": "/malware/Worm:Win32/Yuner.A"
        },
        {
          "id": "Win.Trojan.Zegost",
          "display_name": "Win.Trojan.Zegost",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass",
          "display_name": "PWS:Win32/QQpass",
          "target": "/malware/PWS:Win32/QQpass"
        },
        {
          "id": "Trojan:Win32/Glupteba.MT!MTB",
          "display_name": "Trojan:Win32/Glupteba.MT!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "Win.Trojan.Generic",
          "display_name": "Win.Trojan.Generic",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Muldrop.V!MTB",
          "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
          "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Win32/Trickler",
          "display_name": "Win32/Trickler",
          "target": null
        },
        {
          "id": "Win.Malware.Hd0kzai-9985588-0",
          "display_name": "Win.Malware.Hd0kzai-9985588-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aenjaris.AL!bit",
          "display_name": "Trojan:Win32/Aenjaris.AL!bit",
          "target": "/malware/Trojan:Win32/Aenjaris.AL!bit"
        },
        {
          "id": "Trojan:Win32/Agent.AG!MTB",
          "display_name": "Trojan:Win32/Agent.AG!MTB",
          "target": "/malware/Trojan:Win32/Agent.AG!MTB"
        },
        {
          "id": "Trojan:Win32/Salgorea",
          "display_name": "Trojan:Win32/Salgorea",
          "target": "/malware/Trojan:Win32/Salgorea"
        },
        {
          "id": "Win.Malware.Barys-6840738-0",
          "display_name": "Win.Malware.Barys-6840738-0",
          "target": null
        },
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "Trojan:Win32/EyeStye.T",
          "display_name": "Trojan:Win32/EyeStye.T",
          "target": "/malware/Trojan:Win32/EyeStye.T"
        },
        {
          "id": "wormWin32/Mofksys.RND!MTB",
          "display_name": "wormWin32/Mofksys.RND!MTB",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/VB.IL",
          "display_name": "TrojanDropper:Win32/VB.IL",
          "target": "/malware/TrojanDropper:Win32/VB.IL"
        },
        {
          "id": "CVE 2007695",
          "display_name": "CVE 2007695",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1008",
          "name": "Fallback Channels",
          "display_name": "T1008 - Fallback Channels"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 927,
        "hostname": 2093,
        "FileHash-SHA256": 1474,
        "URL": 5935,
        "FileHash-MD5": 351,
        "FileHash-SHA1": 252,
        "email": 5,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692e068ff95076bb8e75bd9f",
      "name": "Telehealth Exploit",
      "description": "",
      "modified": "2025-12-31T21:02:25",
      "created": "2025-12-01T21:20:15.043000",
      "tags": [
        "passive dns",
        "urls",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "safe browsing",
        "present dec",
        "status",
        "date",
        "united",
        "name servers",
        "netherlands",
        "unknown ns",
        "ip address",
        "search",
        "showing",
        "local",
        "data upload",
        "extraction",
        "flag",
        "bad traffic",
        "et hunting",
        "domain m2",
        "suspicious tls",
        "sni request",
        "windir",
        "openurl c",
        "dns requests",
        "et info",
        "tls handshake",
        "prefetch2",
        "analysis",
        "tor analysis",
        "domain address",
        "tlsv1",
        "jfif",
        "jpeg image",
        "ascii text",
        "entries",
        "as15169",
        "show",
        "read c",
        "write",
        "next",
        "persistence",
        "execution",
        "crash",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 260,
        "hostname": 555,
        "URL": 1803,
        "FileHash-SHA256": 1437,
        "FileHash-MD5": 113,
        "FileHash-SHA1": 13,
        "email": 4,
        "SSLCertFingerprint": 18,
        "CVE": 1
      },
      "indicator_count": 4204,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "109 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68dc624893ea922b898f911b",
      "name": "FBI? Ghe real one? Idk - Cab / Deive by compromised an iOS device",
      "description": "Checking a targets phone, it\u2019s seems very infected with limited results on google searches results. I clicked on an image I thought looked suspicious. Image was coded. I have no idea if this is the FBI I haven\u2019t examined or researched for vulnerabilities yet. I will break this down over time. The number is kept alive but number could not be verified , it was a different number altogether. The phone was out of service, I reached out to 911. And spoke to a person I can\u2019t verify. The service was reconnected a day later. It\u2019s a very crazy hack!",
      "modified": "2025-10-30T22:01:00.256000",
      "created": "2025-09-30T23:05:44.154000",
      "tags": [
        "search",
        "google search",
        "in a",
        "relevance",
        "internet storm",
        "intranet",
        "part",
        "steps",
        "hyper v",
        "windowssystem32",
        "ping request",
        "algorithm",
        "ouno sni",
        "key usage",
        "google llc",
        "v3 serial",
        "number",
        "public key",
        "info",
        "key algorithm",
        "domain",
        "subject key",
        "identifier",
        "net173",
        "net1730000",
        "gogl",
        "orgid",
        "gogl address",
        "city",
        "mountain view",
        "stateprov",
        "postalcode",
        "registrar",
        "ip address",
        "http",
        "port",
        "accept",
        "info file",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "shutdown",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "defense evasion",
        "spawns",
        "found",
        "united",
        "ascii text",
        "pattern match",
        "mitre att",
        "title",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "body",
        "initial access",
        "local",
        "passive dns",
        "urls",
        "url add",
        "related nids",
        "files location",
        "flag united",
        "backdoor",
        "status",
        "aaaa",
        "date",
        "name servers",
        "record value",
        "emails",
        "present aug",
        "present sep",
        "moved",
        "error",
        "antivm",
        "drive by",
        "cab by"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 544,
        "FileHash-SHA256": 2300,
        "URL": 3905,
        "hostname": 1675,
        "FileHash-MD5": 209,
        "FileHash-SHA1": 210,
        "CIDR": 1,
        "email": 7,
        "SSLCertFingerprint": 8,
        "CVE": 2
      },
      "indicator_count": 8861,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "171 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c5743593a4bcc81dd94b0b",
      "name": "Fed.PayPal.com - Ransom | Attacks via redirect",
      "description": "A monitored target, active on various payment platforms for business documented a malicious redirect event 1st seen in 2020. Follows pattern of multiple, critical and ongoing attacks beginning in 2013. In this instance target lost access to PayPal payments. If this is legal, it\u2019s been a grotesque grift. Target was financially and otherwise robbed.\n\n\n#trulymissed #paypal #advesaries #apple #twitter #backdoor #ransom #botnet #reptutationattack",
      "modified": "2025-10-13T13:27:11.277000",
      "created": "2025-09-13T13:40:05.671000",
      "tags": [
        "present sep",
        "virtool",
        "cryp",
        "win32",
        "ip address",
        "trojan",
        "ransom",
        "asn as54113",
        "passive dns",
        "msil",
        "united states",
        "dynamicloader",
        "qaeaav12",
        "high",
        "qbeipbdii",
        "write",
        "paypal",
        "medium",
        "search",
        "vmware",
        "floodfix",
        "malware",
        "united",
        "mtb apr",
        "hostname add",
        "write c",
        "read c",
        "yara detections",
        "upxoepplace",
        "next",
        "markus",
        "april",
        "ping",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "443 ma2592000",
        "ipv4 add",
        "url analysis",
        "urls",
        "body",
        "title",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "status",
        "name servers",
        "set cookie",
        "script urls",
        "present feb",
        "cookie",
        "template",
        "present oct",
        "present jul",
        "present dec",
        "present jun",
        "next associated",
        "urls show",
        "date checked",
        "present apr",
        "url hostname",
        "united kingdom",
        "unknown ns",
        "servers",
        "great britain",
        "msr aug",
        "msr apr",
        "msr nov",
        "ite o",
        "server response",
        "script script",
        "files show",
        "date hash",
        "avast avg",
        "creation date",
        "lcid1033",
        "sminnotek",
        "spnvirtualbox",
        "bvvirtualbox",
        "present mar",
        "present nov",
        "exploit",
        "error",
        "server response",
        "google safe",
        "results sep",
        "backdoor",
        "certificate",
        "mtb sep",
        "next http",
        "scans show",
        "present may",
        "results jun",
        "results jan",
        "worm",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "ids detections",
        "cape",
        "viking",
        "philis",
        "et",
        "torop",
        "des moines",
        "contacted hosts",
        "content reputation",
        "sabey type",
        "tulach type",
        "rexx type",
        "foundry type",
        "fred scherr",
        "twitter",
        "apple",
        "monitored target",
        "financial theft",
        "psalms 27: 1 - 14"
      ],
      "references": [
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fraudpack",
          "display_name": "Win.Trojan.Fraudpack",
          "target": null
        },
        {
          "id": "Fakeav",
          "display_name": "Fakeav",
          "target": null
        },
        {
          "id": "Ransom:MSIL/Genasom.I",
          "display_name": "Ransom:MSIL/Genasom.I",
          "target": "/malware/Ransom:MSIL/Genasom.I"
        },
        {
          "id": "Virtool:Win32/Obfuscator.KI",
          "display_name": "Virtool:Win32/Obfuscator.KI",
          "target": "/malware/Virtool:Win32/Obfuscator.KI"
        },
        {
          "id": "Toga!rfn",
          "display_name": "Toga!rfn",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Remoteadmin-7056666-0",
          "display_name": "Win.Malware.Remoteadmin-7056666-0",
          "target": null
        },
        {
          "id": "Floxif",
          "display_name": "Floxif",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Dropper.Unruy-9994363-0",
          "display_name": "Win.Dropper.Unruy-9994363-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Cycler-47",
          "display_name": "Win.Trojan.Cycler-47",
          "target": null
        },
        {
          "id": "Win.Trojan.Clicker-3506",
          "display_name": "Win.Trojan.Clicker-3506",
          "target": null
        },
        {
          "id": "Win.Downloader.Unruy-10026469-0",
          "display_name": "Win.Downloader.Unruy-10026469-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Urelas",
          "display_name": "Win.Malware.Urelas",
          "target": null
        },
        {
          "id": "Win.Malware.Zusy",
          "display_name": "Win.Malware.Zusy",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "target": null
        },
        {
          "id": "Win.Malware.Eclz-9953021-0",
          "display_name": "Win.Malware.Eclz-9953021-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "target": null
        },
        {
          "id": "Win.Dropper.Tiggre-9845940-0",
          "display_name": "Win.Dropper.Tiggre-9845940-0",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Win.Malware.Sfwx-9853337-0",
          "display_name": "Win.Malware.Sfwx-9853337-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Trojan:Win32/Kaicorn!rf",
          "display_name": "Trojan:Win32/Kaicorn!rf",
          "target": "/malware/Trojan:Win32/Kaicorn!rf"
        },
        {
          "id": "Win32:Banker",
          "display_name": "Win32:Banker",
          "target": null
        },
        {
          "id": "Worm:Win32/Cambot!rfn",
          "display_name": "Worm:Win32/Cambot!rfn",
          "target": "/malware/Worm:Win32/Cambot!rfn"
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847892-0",
          "display_name": "Win.Malware.Midie-6847892-0",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1595.002",
          "name": "Vulnerability Scanning",
          "display_name": "T1595.002 - Vulnerability Scanning"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1321,
        "URL": 4356,
        "FileHash-MD5": 759,
        "FileHash-SHA1": 748,
        "FileHash-SHA256": 5148,
        "domain": 1076,
        "email": 7
      },
      "indicator_count": 13415,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "189 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687605f986433ebf2673f0b8",
      "name": "Win.Malware.Downloadguide-6803841-0 | Patient Monitoring",
      "description": "Part of an elaborate, unrelenting espionage campaign , multiple compromises, targeting.\n> alf:PUA:Win32/DownloadGuide \nLink below found in previous Pulse -[http://s0.patient.media/res/f91b97f6b547405cb4370cbb003dfea2-jquery-1.11.1.min.js.gzip]\n\u2022 Win.Malware.Downloadguide-6803841-0\nYara:\nresearch_pe_signed_outside_timestamp\n\u2022\nkernel32_dll_xor_exe_key_51_key_byte_encoded \u2022\nxor_0x33_kernel32_dll \u2022 \nConcerning: {Domain\tAddress\tRegistrar\tCountry\ns0.patient.media\n-\tGoDaddy.com, LLC\nOrganization: Egton Medical Information Systems Limited\nName Server: ns34.domaincontrol.com\nCreation Date: 2015-01-12T16:20:56}\n\n{https://www.anyxxxtube.net/search-porn/tsara-brashears/}\n{https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net}\n{wallpapers-nature.com}\n{https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian}",
      "modified": "2025-08-14T07:05:00.239000",
      "created": "2025-07-15T07:40:41.180000",
      "tags": [
        "url http",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "entries",
        "gmt etag",
        "server",
        "ecacc",
        "serving ip",
        "address",
        "dom dom",
        "data upload",
        "extraction",
        "pdf report",
        "enter",
        "failed",
        "extraction data",
        "enter sc",
        "type",
        "extra data",
        "extri please",
        "review data",
        "excluded tous",
        "tui sugges",
        "find",
        "show",
        "at filer",
        "iocs",
        "levelbluelabs",
        "please",
        "included iocs",
        "excluded io",
        "find suggested",
        "types",
        "domain data",
        "search",
        "o please",
        "manually add",
        "c data",
        "o suggesteo",
        "include data",
        "review uus",
        "u exclude",
        "find s",
        "indicaok data",
        "dom doman",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "copy",
        "push",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "pattern match",
        "ascii text",
        "size",
        "mitre att",
        "utf8",
        "null",
        "refresh",
        "body",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "date",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "discovery att"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3597,
        "FileHash-MD5": 343,
        "domain": 547,
        "hostname": 1222,
        "FileHash-SHA1": 343,
        "FileHash-SHA256": 4464,
        "CVE": 1,
        "email": 1
      },
      "indicator_count": 10518,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "249 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846860ee9b4faefae8d4cf9",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:58:22.091000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "285 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846860a0c5ff214f345717c",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:58:17.902000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "285 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68468511340fb7ba8eeb7aae",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:54:09.116000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "285 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846850783baea1a6beb7e71",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. I won\u2019t be surprised if OTX cannot pull the threat. My account isn\u2019t allowing me full permissions. \n\n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:53:59.933000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "285 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://adservice.google.off.ai",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://adservice.google.off.ai",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776703960.909983
}