{
  "type": "URL",
  "indicator": "https://alliant.it",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://alliant.it",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3169302926,
      "indicator": "https://alliant.it",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 20,
      "pulses": [
        {
          "id": "68ddea7d79d06d06002c8633",
          "name": "E-PRODIGY.COM | ACHCAPITAL.COM",
          "description": "I need to update this soon",
          "modified": "2025-11-01T01:01:18.619000",
          "created": "2025-10-02T02:59:09.210000",
          "tags": [
            "portsmouth",
            "united kingdom",
            "cogecopeer1",
            "securehost",
            "united",
            "ashburn",
            "amazonaes",
            "wiesbaden",
            "virgin islands",
            "wqrmholdings",
            "nashville",
            "asnvins",
            "chicago",
            "quickpacket",
            "kansas city"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "gameprofits.io",
            "id": "170823",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_170823/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 313,
            "hostname": 246,
            "URL": 1416,
            "FileHash-SHA256": 175
          },
          "indicator_count": 2150,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "169 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c7b86fa120d19bbc88f367",
          "name": "Hijacker",
          "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
          "modified": "2024-03-11T17:01:59.026000",
          "created": "2024-02-10T17:54:55.243000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "tsara brashears",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "high level",
            "hackers",
            "hacktool",
            "download",
            "malware",
            "crypto",
            "hijacker",
            "monitoring",
            "installer",
            "tofsee",
            "domains domains",
            "domains files",
            "files files",
            "script",
            "kgs0",
            "kls0",
            "relic",
            "iframe",
            "pe32 executable",
            "ms windows",
            "intel",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "rticon neutral",
            "info compiler",
            "products id",
            "header intel",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "neutral",
            "first",
            "utc submissions",
            "submitters",
            "company limited",
            "computer",
            "amazonaes",
            "china telecom",
            "group",
            "csc corporate",
            "domains",
            "malware spreading evader",
            "cnc",
            "malvertizing",
            "milehighmedia",
            "trojandropper",
            "moved",
            "passive dns",
            "urls",
            "as14576",
            "backdoor",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "trojan",
            "encrypt",
            "body",
            "date",
            "date hash",
            "avast avg",
            "mtb may",
            "kratona",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls https",
            "script urls",
            "united",
            "meta",
            "unknown",
            "emails",
            "name servers",
            "search",
            "as62597 nsone",
            "a domains",
            "as397241",
            "media",
            "next",
            "december",
            "unlocker",
            "threat round",
            "apple ios",
            "apple phone",
            "project",
            "blister",
            "agent tesla",
            "open",
            "execution",
            "videos",
            "strong",
            "porn videos",
            "watch",
            "daddy",
            "free",
            "top rated",
            "most viewed",
            "cancel anytime",
            "views",
            "play",
            "black",
            "enjoy",
            "czech",
            "hunk",
            "virtool",
            "cryp",
            "creation date",
            "otx telemetry",
            "expiration date",
            "servers",
            "status",
            "win32",
            "showing",
            "domain",
            "nxdomain",
            "as8075",
            "shell code",
            "threat",
            "cyber espionage",
            "cyber stalking",
            "danger",
            "critical",
            "attack",
            "treats",
            "as15169 google",
            "aaaa",
            "record value",
            "error",
            "entries",
            "hostname",
            "url http",
            "http",
            "files domain",
            "files related",
            "shinjiru msc",
            "sdn bhd",
            "dnssec",
            "protect",
            "as54455 madeit",
            "phishing",
            "backdoor",
            "contextualizing",
            "elevated exposure",
            "malvertizing",
            "ransom",
            "msil",
            "hackers for hire",
            "hashes",
            "http method",
            "get http",
            "http requests",
            "get dns",
            "ip traffic",
            "memory pattern",
            "pattern ips",
            "@emreimer",
            "iextract2",
            "cp cyber",
            "denver",
            "security",
            "siem compliance",
            "skip",
            "cybersecurity",
            "larimer st",
            "suite",
            "resources cyber",
            "risk assessment",
            "bill",
            "mind",
            "delaware",
            "pa",
            "arizona",
            "colorado",
            "stalkers",
            "deuteronomy 28:7",
            "hitmen"
          ],
          "references": [
            "honey.exe",
            "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
            "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
            "CS Sigma Rules: Python Initiated Connection by frack113",
            "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
            "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
            "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "api.login.live.com",
            "http://appleid.icloud.com-website33.org/",
            "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
            "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
            "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
            "message.htm.com",
            "http://pornhub.com/gay/video/search",
            "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
            "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "W32.Sality.PE",
              "display_name": "W32.Sality.PE",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Virus.Win32.Virut.q",
              "display_name": "Virus.Win32.Virut.q",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32",
              "display_name": "TrojanDropper:Win32",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 54,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6303,
            "FileHash-MD5": 215,
            "FileHash-SHA1": 192,
            "FileHash-SHA256": 2663,
            "domain": 2673,
            "hostname": 2686,
            "CVE": 2,
            "email": 16
          },
          "indicator_count": 14750,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659b4cea3e6da3a00306ae11",
          "name": "Ragnar Locker | Cowrie Hash",
          "description": "Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and shell interaction performed by an attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system. Cowrie was developed from Kippo.\n\nRagnar Locker: \nAffected platforms: Microsoft Windows\nImpacted parties: Microsoft Windows  & Linux Users\nImpact: Encrypts files on the compromised machine and demands ransom for file decryption\nSeverity level: High\n\nI'm not sure. It seems this 'Law' group aquires and sell your digital profiles, PHI. PII, Banking , Insurance credentials on the dark web.",
          "modified": "2024-02-06T23:04:54.022000",
          "created": "2024-01-08T01:16:26.884000",
          "tags": [
            "contacted",
            "pe resource",
            "execution",
            "problems",
            "alienvault part",
            "dropped",
            "kgs0",
            "kls0",
            "collections",
            "schema abuse",
            "iframe",
            "united",
            "as29791",
            "search",
            "entries",
            "passive dns",
            "urls",
            "service",
            "date",
            "unknown",
            "japan unknown",
            "body",
            "czechia unknown",
            "sinkhole",
            "emotet",
            "date hash",
            "avast avg",
            "mtb dec",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "samples",
            "tulach",
            "tulach.cc",
            "sabey data center",
            "malware server",
            "gorf",
            "set cookie",
            "united kingdom",
            "script urls",
            "trojan",
            "status",
            "showing",
            "cookie",
            "template",
            "johnnsabey",
            "briansabey",
            "data center",
            "choco",
            "name",
            "win32 exe",
            "domains",
            "registrar",
            "markmonitor inc",
            "ip detections",
            "country",
            "us execution",
            "parents",
            "whois record",
            "whois whois",
            "ssl certificate",
            "apple ios",
            "red team",
            "tsara brashears",
            "historical ssl",
            "hacktool",
            "copy",
            "malicious",
            "life",
            "unsafe",
            "server",
            "registrar abuse",
            "contact phone",
            "domain status",
            "registrar whois",
            "email",
            "registry domain",
            "registry expiry",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "ec oid",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "info",
            "first",
            "http method",
            "http requests",
            "connect http",
            "get dns",
            "resolutions",
            "ip traffic",
            "intel",
            "ms windows",
            "write c",
            "pe32",
            "pe32 executable",
            "copy c",
            "show",
            "free",
            "recon",
            "benjamin",
            "write",
            "worm",
            "win32",
            "june",
            "delphi",
            "code",
            "malware",
            "next",
            "using",
            "urls http",
            "benjamin",
            "nids",
            "cowrie hashes",
            "dns replication",
            "files",
            "sample",
            "sender",
            "us postal",
            "cowrie",
            "iranian actor",
            "shipping",
            "healthcare",
            "ragnar locker",
            "qakbot",
            "qbot",
            "pii",
            "phi",
            "privacy",
            "honeypot",
            "referrer",
            "spyware",
            "android",
            "nanocore",
            "banker",
            "keylogger"
          ],
          "references": [
            "choco.exe",
            "media-router-fp74.prod.media.vip.bf1.yahoo.com",
            "https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector?hs_amp=true",
            "httphttp://security.didici.cc/cves://www.sentinelone.com/anthology/ragnar-locker/",
            "http://security.didici.cc/cve",
            "https://whois.domaintools.com/gov1.info",
            "https://nsa.gov1.info/utah-data-center/",
            "https://github.com/cowrie/cowrie",
            "Cowrie (honeypot) - Wikipedia",
            "https://www.fortinet.com/blog/threat-research/ransomware-roundup-ragnar-locker-ransomware"
          ],
          "public": 1,
          "adversary": "Ragnar Locker | M. Brian Sabey | HallRender| Tulach | Benjamin",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "ALF:Win32/GbdInf_123DF591.J!ibt",
              "display_name": "ALF:Win32/GbdInf_123DF591.J!ibt",
              "target": "/malware/ALF:Win32/GbdInf_123DF591.J!ibt"
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_f28c33a2!ibt",
              "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2!ibt",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_ade36583!ibt",
              "display_name": "ALF:Trojan:Win32/Cassini_ade36583!ibt",
              "target": null
            },
            {
              "id": "ALF:Ransom:Win32/Babax.SG!MTB",
              "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
              "target": null
            },
            {
              "id": "ALF:SpikeAexR.SECTHDR",
              "display_name": "ALF:SpikeAexR.SECTHDR",
              "target": null
            },
            {
              "id": "ALF:Trojan:MSIL/AgentTesla.KM",
              "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker ,   ,  ALF:Trojan:Win32/AutoRun.PI!MTB ,  ALF:Trojan:Win32/Cassini_6d4ebdc9!ibt",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker ,   ,  ALF:Trojan:Win32/AutoRun.PI!MTB ,  ALF:Trojan:Win32/Cassini_6d4ebdc9!ibt",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Ransom:MSIL/Gorf",
              "display_name": "ALF:HeraklezEval:Ransom:MSIL/Gorf",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "Ragnar Locker",
              "display_name": "Ragnar Locker",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Trojan",
              "display_name": "Trojan",
              "target": null
            },
            {
              "id": "Worm",
              "display_name": "Worm",
              "target": null
            },
            {
              "id": "NanCore RAY",
              "display_name": "NanCore RAY",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [
            "Healthcare",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 347,
            "FileHash-SHA1": 222,
            "FileHash-SHA256": 6645,
            "hostname": 2744,
            "URL": 9123,
            "domain": 3065,
            "email": 4
          },
          "indicator_count": 22150,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "802 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65575839f772f9f944f7af94",
          "name": "Command and Scripting Interpreter | www.supernetforme.com",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T12:10:33.958000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "communicating",
            "referrer",
            "june",
            "july",
            "october",
            "historical ssl",
            "malware",
            "august",
            "path",
            "treatas",
            "hkcuclsid",
            "document file",
            "v2 document",
            "sha256",
            "ascii text",
            "size",
            "type data",
            "html document",
            "february",
            "hybrid",
            "general",
            "local",
            "factory",
            "click",
            "strings",
            "pattern match",
            "root ca",
            "authority",
            "class",
            "script",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "date",
            "error",
            "unknown",
            "generator",
            "critical",
            "body",
            "info",
            "trace",
            "void",
            "c2",
            "trojan",
            "parked domain",
            "registrar abuse",
            "tracking",
            "deep search",
            "command_and_control"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "AI Packer",
              "display_name": "AI Packer",
              "target": null
            },
            {
              "id": "Trojan",
              "display_name": "Trojan",
              "target": null
            },
            {
              "id": "Banto",
              "display_name": "Banto",
              "target": null
            },
            {
              "id": "Matrix",
              "display_name": "Matrix",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 368,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 76,
            "FileHash-SHA256": 1015,
            "URL": 1639,
            "domain": 329
          },
          "indicator_count": 3508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d0502a76f986c48cf21",
          "name": "User-94-254-129-104.play-internet.pl - historic ip in enviroment",
          "description": "",
          "modified": "2023-12-06T15:02:28.801000",
          "created": "2023-12-06T15:02:28.801000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 50,
            "URL": 474,
            "domain": 124,
            "hostname": 200,
            "email": 1,
            "CIDR": 15
          },
          "indicator_count": 864,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d00b1d8a5ad0edc6616",
          "name": "83.21.254.58 - IP Address Information - Operation System, Web Browser on 83.21.254.58",
          "description": "",
          "modified": "2023-12-06T15:02:24.062000",
          "created": "2023-12-06T15:02:24.062000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 55,
            "URL": 291,
            "domain": 149,
            "hostname": 156
          },
          "indicator_count": 651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cfd565205e0e49a5de0",
          "name": "94.254.129.104 - IP Address Information - Operation System, Web Browser on 94.254.129.104",
          "description": "",
          "modified": "2023-12-06T15:02:21.711000",
          "created": "2023-12-06T15:02:21.711000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 59,
            "URL": 159,
            "domain": 35,
            "hostname": 31,
            "CIDR": 2,
            "email": 1
          },
          "indicator_count": 287,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ce47f0895a860febf8e",
          "name": "Error 403 access denied ?!?! URL https://myip.ms/#a",
          "description": "",
          "modified": "2023-12-06T15:01:56.022000",
          "created": "2023-12-06T15:01:56.022000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 45,
            "URL": 91,
            "domain": 18,
            "hostname": 23
          },
          "indicator_count": 177,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cb244b759b0ba42d5f3",
          "name": "217.160.83.245",
          "description": "",
          "modified": "2023-12-06T15:01:06.011000",
          "created": "2023-12-06T15:01:06.011000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 43,
            "URL": 484,
            "domain": 391,
            "hostname": 169
          },
          "indicator_count": 1087,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cb0c59f1e24288b50d2",
          "name": "Zhihu.com Hosting Whois Information - Zhihu.com",
          "description": "",
          "modified": "2023-12-06T15:01:04.066000",
          "created": "2023-12-06T15:01:04.066000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 48,
            "URL": 186,
            "domain": 34,
            "hostname": 74
          },
          "indicator_count": 342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bab8304188fdecd3d4f",
          "name": "https://traffic.camp - 185.59.221.226",
          "description": "",
          "modified": "2023-12-06T14:56:43.094000",
          "created": "2023-12-06T14:56:43.094000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 161,
            "hostname": 266,
            "URL": 549,
            "domain": 149,
            "CIDR": 1
          },
          "indicator_count": 1126,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707dbbb0493c03ba107643",
          "name": "loggly.com and pstv.com/ supernetforme.com live malware",
          "description": "",
          "modified": "2023-12-06T13:57:15.377000",
          "created": "2023-12-06T13:57:15.377000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 1933,
            "domain": 1302,
            "hostname": 805,
            "URL": 3593,
            "FileHash-MD5": 1
          },
          "indicator_count": 7635,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626d39a31052861820cd93da",
          "name": "User-94-254-129-104.play-internet.pl - historic ip in enviroment",
          "description": "\"User-94-254-129-104.play-internet.pl\n5.79.85.217\nlw374.ua-hosting.com.ua\n95.211.189.247\nlw23.ua-hosting.com.ua\n174.120.18.157      \n9d.12.78ae.static.theplanet.com\n94.254.129.104\"",
          "modified": "2022-05-31T00:03:47.846000",
          "created": "2022-04-30T13:29:07.578000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 200,
            "URL": 474,
            "FileHash-SHA256": 50,
            "domain": 124,
            "CIDR": 15,
            "email": 1
          },
          "indicator_count": 864,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 394,
          "modified_text": "1419 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626c9c396b7e3d1eb202d223",
          "name": "83.21.254.58 - IP Address Information - Operation System, Web Browser on 83.21.254.58",
          "description": "",
          "modified": "2022-05-30T00:00:40.928000",
          "created": "2022-04-30T02:17:29.132000",
          "tags": [
            "83.21.254.58",
            "83.21.254.58 country",
            "83.21.254.58 browser",
            "83.21.254.58 os",
            "database",
            "world",
            "ip addresses",
            "site",
            "address ranges",
            "your website",
            "ip address",
            "world hosting",
            "report",
            "addresses",
            "hosts",
            "indonesia",
            "slovakia",
            "belarus",
            "live",
            "facebook",
            "agent",
            "date"
          ],
          "references": [
            "https://myip.ms/view/myip/38579237/83.21.254.58"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 55,
            "hostname": 156,
            "URL": 291,
            "domain": 149
          },
          "indicator_count": 651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 395,
          "modified_text": "1420 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626c92eeba020c8da9c0882a",
          "name": "94.254.129.104 - IP Address Information - Operation System, Web Browser on 94.254.129.104",
          "description": "",
          "modified": "2022-05-30T00:00:40.928000",
          "created": "2022-04-30T01:37:50.778000",
          "tags": [
            "94.254.129.104",
            "94.254.129.104 country",
            "94.254.129.104 browser",
            "94.254.129.104 os",
            "database",
            "world",
            "ip addresses",
            "world hosting",
            "report",
            "address ranges",
            "ip address",
            "site",
            "addresses",
            "bots",
            "hosts",
            "indonesia",
            "slovakia",
            "belarus",
            "live",
            "facebook",
            "agent",
            "date"
          ],
          "references": [
            "https://myip.ms/view/myip/38349290/94.254.129.104"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 59,
            "hostname": 31,
            "URL": 159,
            "domain": 35,
            "CIDR": 2,
            "email": 1
          },
          "indicator_count": 287,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1420 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626b019587fbb2b593c11b71",
          "name": "Error 403 access denied ?!?! URL https://myip.ms/#a",
          "description": "",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T21:05:25.585000",
          "tags": [
            "whois",
            "my ip address",
            "blacklist ip",
            "web bots list",
            "ipv4",
            "ipv6",
            "database",
            "khtml",
            "gecko",
            "agent",
            "windows",
            "windows nt",
            "x64 edition",
            "win64",
            "state",
            "april",
            "android",
            "download",
            "hosts",
            "indonesia",
            "slovakia",
            "belarus",
            "live",
            "facebook",
            "info",
            "easy"
          ],
          "references": [
            "https://myip.ms/#a"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 45,
            "URL": 91,
            "hostname": 23,
            "domain": 18
          },
          "indicator_count": 177,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1422 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62687dff7cdb84203e255f38",
          "name": "217.160.83.245",
          "description": "",
          "modified": "2022-05-27T00:00:15.468000",
          "created": "2022-04-26T23:19:27.057000",
          "tags": [
            "sqlstate",
            "hy000",
            "connection",
            "davidtennantontwitter.com",
            "davidtennantontwitter.com who hosts",
            "davidtennantontwitter.com hosting",
            "davidtennantontwitter.com ip owner",
            "database",
            "world",
            "ip address",
            "ip addresses",
            "united kingdom",
            "websites",
            "nameservers",
            "hosts",
            "address ranges",
            "internet ltd",
            "indonesia",
            "slovakia",
            "belarus",
            "live",
            "facebook",
            "date",
            "germany",
            "country total",
            "nameserver top",
            "time"
          ],
          "references": [
            "ns2.streamlinedns.co.uk\t217.160.83.245\tGermany",
            "https://myip.ms/view/sites/11766129/davidtennantontwitter.com",
            "http://s2kszs92s.us-02.live-paas.net/maint/vf_list/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 43,
            "hostname": 169,
            "URL": 484,
            "domain": 391
          },
          "indicator_count": 1087,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1423 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626813ca2bcaaa6b76683a27",
          "name": "Zhihu.com Hosting Whois Information - Zhihu.com",
          "description": "",
          "modified": "2022-05-26T00:02:33.465000",
          "created": "2022-04-26T15:46:18.357000",
          "tags": [
            "zhihu.com",
            "zhihu.com who hosts",
            "zhihu.com hosting",
            "zhihu.com ip owner",
            "world site",
            "popular rating",
            "database",
            "world",
            "world hosting",
            "ip addresses",
            "websites",
            "ip address",
            "report",
            "china",
            "mind",
            "hosts",
            "indonesia",
            "slovakia",
            "belarus",
            "live",
            "facebook",
            "date"
          ],
          "references": [
            "https://myip.ms/view/sites/2176/zhihu.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 74,
            "URL": 186,
            "domain": 34,
            "FileHash-SHA256": 48
          },
          "indicator_count": 342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6255ab40dece9af8c5049744",
          "name": "https://traffic.camp - 185.59.221.226",
          "description": "United Kingdom, Datacamp Limited   185.59.221.226  \nWin10, Chrome 100.0, Unknown\n12 Apr\t16:50:55\t\n https://traffic.camp/",
          "modified": "2022-05-13T00:03:35.765000",
          "created": "2022-04-12T16:39:28.995000",
          "tags": [
            "https://traffic.camp",
            "185.59.221.226",
            "Iomart cloud",
            "Bad Actor Set up"
          ],
          "references": [
            "United KingdomLondon, United Kingdom, Datacamp Limited   185.59.221.226    Session #2  Win10, Chrome 100.0, Unknown  \t \t (No referring link) 12 Apr\t16:50:55\t  https://traffic.camp/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 161,
            "hostname": 266,
            "URL": 549,
            "domain": 149,
            "CIDR": 1
          },
          "indicator_count": 1126,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1437 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "61f9b4b2c6c645e9839112b2",
          "name": "loggly.com and pstv.com/ supernetforme.com live malware",
          "description": "www.logs-01.loggly.com\ncallplus.loggly.com\npopcap.loggly.com\nwiki.loggly.com",
          "modified": "2022-03-04T00:00:56.902000",
          "created": "2022-02-01T22:31:14.017000",
          "tags": [
            "irst seen",
            "date",
            "file sha256",
            "network related",
            "malicious",
            "found"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3593,
            "FileHash-SHA256": 1933,
            "hostname": 805,
            "domain": 1302,
            "FileHash-MD5": 1,
            "CVE": 1
          },
          "indicator_count": 7635,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 397,
          "modified_text": "1507 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "media-router-fp74.prod.media.vip.bf1.yahoo.com",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "https://myip.ms/view/myip/38349290/94.254.129.104",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "choco.exe",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector?hs_amp=true",
        "https://www.fortinet.com/blog/threat-research/ransomware-roundup-ragnar-locker-ransomware",
        "https://nsa.gov1.info/utah-data-center/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://whois.domaintools.com/gov1.info",
        "api.login.live.com",
        "https://myip.ms/#a",
        "http://appleid.icloud.com-website33.org/",
        "message.htm.com",
        "http://security.didici.cc/cve",
        "Cowrie (honeypot) - Wikipedia",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "httphttp://security.didici.cc/cves://www.sentinelone.com/anthology/ragnar-locker/",
        "https://myip.ms/view/sites/2176/zhihu.com",
        "http://pornhub.com/gay/video/search",
        "ns2.streamlinedns.co.uk\t217.160.83.245\tGermany",
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "http://s2kszs92s.us-02.live-paas.net/maint/vf_list/",
        "https://myip.ms/view/sites/11766129/davidtennantontwitter.com",
        "honey.exe",
        "https://myip.ms/view/myip/38579237/83.21.254.58",
        "United KingdomLondon, United Kingdom, Datacamp Limited   185.59.221.226    Session #2  Win10, Chrome 100.0, Unknown  \t \t (No referring link) 12 Apr\t16:50:55\t  https://traffic.camp/",
        "https://github.com/cowrie/cowrie",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Ragnar Locker | M. Brian Sabey | HallRender| Tulach | Benjamin"
          ],
          "malware_families": [
            "Worm",
            "Ragnar locker",
            "Unruy",
            "Alf:trojan:win32/cassini_ade36583!ibt",
            "Alf:spikeaexr.secthdr",
            "Trojan",
            "Virus.win32.virut.q",
            "Alf:trojan:win32/cassini_f28c33a2!ibt",
            "Matrix",
            "W32.sality.pe",
            "Banto",
            "Relic",
            "Worm:win32/benjamin",
            "Virtool",
            "Qakbot",
            "Alf:trojan:msil/agenttesla.km",
            "Trojandropper:win32",
            "Qbot",
            "Sabey",
            "Nancore ray",
            "Tulach",
            "Trojanspy",
            "Tofsee",
            "Hallrender",
            "Alf:win32/gbdinf_123df591.j!ibt",
            "Hacktool",
            "Alf:heraklezeval:ransom:msil/gorf",
            "Emotet",
            "Alf:heraklezeval:trojan:win32/clipbanker ,   ,  alf:trojan:win32/autorun.pi!mtb ,  alf:trojan:win32/cassini_6d4ebdc9!ibt",
            "Alf:ransom:win32/babax.sg!mtb",
            "Ai packer"
          ],
          "industries": [
            "Insurance",
            "Healthcare"
          ],
          "unique_indicators": 50855
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/alliant.it",
    "whois": "http://whois.domaintools.com/alliant.it",
    "domain": "alliant.it",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 20,
  "pulses": [
    {
      "id": "68ddea7d79d06d06002c8633",
      "name": "E-PRODIGY.COM | ACHCAPITAL.COM",
      "description": "I need to update this soon",
      "modified": "2025-11-01T01:01:18.619000",
      "created": "2025-10-02T02:59:09.210000",
      "tags": [
        "portsmouth",
        "united kingdom",
        "cogecopeer1",
        "securehost",
        "united",
        "ashburn",
        "amazonaes",
        "wiesbaden",
        "virgin islands",
        "wqrmholdings",
        "nashville",
        "asnvins",
        "chicago",
        "quickpacket",
        "kansas city"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "gameprofits.io",
        "id": "170823",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_170823/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 313,
        "hostname": 246,
        "URL": 1416,
        "FileHash-SHA256": 175
      },
      "indicator_count": 2150,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "169 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c7b86fa120d19bbc88f367",
      "name": "Hijacker",
      "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
      "modified": "2024-03-11T17:01:59.026000",
      "created": "2024-02-10T17:54:55.243000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "tsara brashears",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "high level",
        "hackers",
        "hacktool",
        "download",
        "malware",
        "crypto",
        "hijacker",
        "monitoring",
        "installer",
        "tofsee",
        "domains domains",
        "domains files",
        "files files",
        "script",
        "kgs0",
        "kls0",
        "relic",
        "iframe",
        "pe32 executable",
        "ms windows",
        "intel",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "rticon neutral",
        "info compiler",
        "products id",
        "header intel",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "neutral",
        "first",
        "utc submissions",
        "submitters",
        "company limited",
        "computer",
        "amazonaes",
        "china telecom",
        "group",
        "csc corporate",
        "domains",
        "malware spreading evader",
        "cnc",
        "malvertizing",
        "milehighmedia",
        "trojandropper",
        "moved",
        "passive dns",
        "urls",
        "as14576",
        "backdoor",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "trojan",
        "encrypt",
        "body",
        "date",
        "date hash",
        "avast avg",
        "mtb may",
        "kratona",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls https",
        "script urls",
        "united",
        "meta",
        "unknown",
        "emails",
        "name servers",
        "search",
        "as62597 nsone",
        "a domains",
        "as397241",
        "media",
        "next",
        "december",
        "unlocker",
        "threat round",
        "apple ios",
        "apple phone",
        "project",
        "blister",
        "agent tesla",
        "open",
        "execution",
        "videos",
        "strong",
        "porn videos",
        "watch",
        "daddy",
        "free",
        "top rated",
        "most viewed",
        "cancel anytime",
        "views",
        "play",
        "black",
        "enjoy",
        "czech",
        "hunk",
        "virtool",
        "cryp",
        "creation date",
        "otx telemetry",
        "expiration date",
        "servers",
        "status",
        "win32",
        "showing",
        "domain",
        "nxdomain",
        "as8075",
        "shell code",
        "threat",
        "cyber espionage",
        "cyber stalking",
        "danger",
        "critical",
        "attack",
        "treats",
        "as15169 google",
        "aaaa",
        "record value",
        "error",
        "entries",
        "hostname",
        "url http",
        "http",
        "files domain",
        "files related",
        "shinjiru msc",
        "sdn bhd",
        "dnssec",
        "protect",
        "as54455 madeit",
        "phishing",
        "backdoor",
        "contextualizing",
        "elevated exposure",
        "malvertizing",
        "ransom",
        "msil",
        "hackers for hire",
        "hashes",
        "http method",
        "get http",
        "http requests",
        "get dns",
        "ip traffic",
        "memory pattern",
        "pattern ips",
        "@emreimer",
        "iextract2",
        "cp cyber",
        "denver",
        "security",
        "siem compliance",
        "skip",
        "cybersecurity",
        "larimer st",
        "suite",
        "resources cyber",
        "risk assessment",
        "bill",
        "mind",
        "delaware",
        "pa",
        "arizona",
        "colorado",
        "stalkers",
        "deuteronomy 28:7",
        "hitmen"
      ],
      "references": [
        "honey.exe",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "api.login.live.com",
        "http://appleid.icloud.com-website33.org/",
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
        "message.htm.com",
        "http://pornhub.com/gay/video/search",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "W32.Sality.PE",
          "display_name": "W32.Sality.PE",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Virus.Win32.Virut.q",
          "display_name": "Virus.Win32.Virut.q",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32",
          "display_name": "TrojanDropper:Win32",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 54,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6303,
        "FileHash-MD5": 215,
        "FileHash-SHA1": 192,
        "FileHash-SHA256": 2663,
        "domain": 2673,
        "hostname": 2686,
        "CVE": 2,
        "email": 16
      },
      "indicator_count": 14750,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "769 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659b4cea3e6da3a00306ae11",
      "name": "Ragnar Locker | Cowrie Hash",
      "description": "Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and shell interaction performed by an attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system. Cowrie was developed from Kippo.\n\nRagnar Locker: \nAffected platforms: Microsoft Windows\nImpacted parties: Microsoft Windows  & Linux Users\nImpact: Encrypts files on the compromised machine and demands ransom for file decryption\nSeverity level: High\n\nI'm not sure. It seems this 'Law' group aquires and sell your digital profiles, PHI. PII, Banking , Insurance credentials on the dark web.",
      "modified": "2024-02-06T23:04:54.022000",
      "created": "2024-01-08T01:16:26.884000",
      "tags": [
        "contacted",
        "pe resource",
        "execution",
        "problems",
        "alienvault part",
        "dropped",
        "kgs0",
        "kls0",
        "collections",
        "schema abuse",
        "iframe",
        "united",
        "as29791",
        "search",
        "entries",
        "passive dns",
        "urls",
        "service",
        "date",
        "unknown",
        "japan unknown",
        "body",
        "czechia unknown",
        "sinkhole",
        "emotet",
        "date hash",
        "avast avg",
        "mtb dec",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "samples",
        "tulach",
        "tulach.cc",
        "sabey data center",
        "malware server",
        "gorf",
        "set cookie",
        "united kingdom",
        "script urls",
        "trojan",
        "status",
        "showing",
        "cookie",
        "template",
        "johnnsabey",
        "briansabey",
        "data center",
        "choco",
        "name",
        "win32 exe",
        "domains",
        "registrar",
        "markmonitor inc",
        "ip detections",
        "country",
        "us execution",
        "parents",
        "whois record",
        "whois whois",
        "ssl certificate",
        "apple ios",
        "red team",
        "tsara brashears",
        "historical ssl",
        "hacktool",
        "copy",
        "malicious",
        "life",
        "unsafe",
        "server",
        "registrar abuse",
        "contact phone",
        "domain status",
        "registrar whois",
        "email",
        "registry domain",
        "registry expiry",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "ec oid",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "info",
        "first",
        "http method",
        "http requests",
        "connect http",
        "get dns",
        "resolutions",
        "ip traffic",
        "intel",
        "ms windows",
        "write c",
        "pe32",
        "pe32 executable",
        "copy c",
        "show",
        "free",
        "recon",
        "benjamin",
        "write",
        "worm",
        "win32",
        "june",
        "delphi",
        "code",
        "malware",
        "next",
        "using",
        "urls http",
        "benjamin",
        "nids",
        "cowrie hashes",
        "dns replication",
        "files",
        "sample",
        "sender",
        "us postal",
        "cowrie",
        "iranian actor",
        "shipping",
        "healthcare",
        "ragnar locker",
        "qakbot",
        "qbot",
        "pii",
        "phi",
        "privacy",
        "honeypot",
        "referrer",
        "spyware",
        "android",
        "nanocore",
        "banker",
        "keylogger"
      ],
      "references": [
        "choco.exe",
        "media-router-fp74.prod.media.vip.bf1.yahoo.com",
        "https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector?hs_amp=true",
        "httphttp://security.didici.cc/cves://www.sentinelone.com/anthology/ragnar-locker/",
        "http://security.didici.cc/cve",
        "https://whois.domaintools.com/gov1.info",
        "https://nsa.gov1.info/utah-data-center/",
        "https://github.com/cowrie/cowrie",
        "Cowrie (honeypot) - Wikipedia",
        "https://www.fortinet.com/blog/threat-research/ransomware-roundup-ragnar-locker-ransomware"
      ],
      "public": 1,
      "adversary": "Ragnar Locker | M. Brian Sabey | HallRender| Tulach | Benjamin",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "ALF:Win32/GbdInf_123DF591.J!ibt",
          "display_name": "ALF:Win32/GbdInf_123DF591.J!ibt",
          "target": "/malware/ALF:Win32/GbdInf_123DF591.J!ibt"
        },
        {
          "id": "SABEY",
          "display_name": "SABEY",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_f28c33a2!ibt",
          "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2!ibt",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_ade36583!ibt",
          "display_name": "ALF:Trojan:Win32/Cassini_ade36583!ibt",
          "target": null
        },
        {
          "id": "ALF:Ransom:Win32/Babax.SG!MTB",
          "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
          "target": null
        },
        {
          "id": "ALF:SpikeAexR.SECTHDR",
          "display_name": "ALF:SpikeAexR.SECTHDR",
          "target": null
        },
        {
          "id": "ALF:Trojan:MSIL/AgentTesla.KM",
          "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker ,   ,  ALF:Trojan:Win32/AutoRun.PI!MTB ,  ALF:Trojan:Win32/Cassini_6d4ebdc9!ibt",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker ,   ,  ALF:Trojan:Win32/AutoRun.PI!MTB ,  ALF:Trojan:Win32/Cassini_6d4ebdc9!ibt",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Ransom:MSIL/Gorf",
          "display_name": "ALF:HeraklezEval:Ransom:MSIL/Gorf",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        },
        {
          "id": "Ragnar Locker",
          "display_name": "Ragnar Locker",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Trojan",
          "display_name": "Trojan",
          "target": null
        },
        {
          "id": "Worm",
          "display_name": "Worm",
          "target": null
        },
        {
          "id": "NanCore RAY",
          "display_name": "NanCore RAY",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [
        "Healthcare",
        "Insurance"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 347,
        "FileHash-SHA1": 222,
        "FileHash-SHA256": 6645,
        "hostname": 2744,
        "URL": 9123,
        "domain": 3065,
        "email": 4
      },
      "indicator_count": 22150,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "802 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65575839f772f9f944f7af94",
      "name": "Command and Scripting Interpreter | www.supernetforme.com",
      "description": "",
      "modified": "2023-12-17T11:03:45.376000",
      "created": "2023-11-17T12:10:33.958000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "contacted",
        "communicating",
        "referrer",
        "june",
        "july",
        "october",
        "historical ssl",
        "malware",
        "august",
        "path",
        "treatas",
        "hkcuclsid",
        "document file",
        "v2 document",
        "sha256",
        "ascii text",
        "size",
        "type data",
        "html document",
        "february",
        "hybrid",
        "general",
        "local",
        "factory",
        "click",
        "strings",
        "pattern match",
        "root ca",
        "authority",
        "class",
        "script",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "date",
        "error",
        "unknown",
        "generator",
        "critical",
        "body",
        "info",
        "trace",
        "void",
        "c2",
        "trojan",
        "parked domain",
        "registrar abuse",
        "tracking",
        "deep search",
        "command_and_control"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "AI Packer",
          "display_name": "AI Packer",
          "target": null
        },
        {
          "id": "Trojan",
          "display_name": "Trojan",
          "target": null
        },
        {
          "id": "Banto",
          "display_name": "Banto",
          "target": null
        },
        {
          "id": "Matrix",
          "display_name": "Matrix",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 368,
        "FileHash-MD5": 81,
        "FileHash-SHA1": 76,
        "FileHash-SHA256": 1015,
        "URL": 1639,
        "domain": 329
      },
      "indicator_count": 3508,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708d0502a76f986c48cf21",
      "name": "User-94-254-129-104.play-internet.pl - historic ip in enviroment",
      "description": "",
      "modified": "2023-12-06T15:02:28.801000",
      "created": "2023-12-06T15:02:28.801000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 50,
        "URL": 474,
        "domain": 124,
        "hostname": 200,
        "email": 1,
        "CIDR": 15
      },
      "indicator_count": 864,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708d00b1d8a5ad0edc6616",
      "name": "83.21.254.58 - IP Address Information - Operation System, Web Browser on 83.21.254.58",
      "description": "",
      "modified": "2023-12-06T15:02:24.062000",
      "created": "2023-12-06T15:02:24.062000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 55,
        "URL": 291,
        "domain": 149,
        "hostname": 156
      },
      "indicator_count": 651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cfd565205e0e49a5de0",
      "name": "94.254.129.104 - IP Address Information - Operation System, Web Browser on 94.254.129.104",
      "description": "",
      "modified": "2023-12-06T15:02:21.711000",
      "created": "2023-12-06T15:02:21.711000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 59,
        "URL": 159,
        "domain": 35,
        "hostname": 31,
        "CIDR": 2,
        "email": 1
      },
      "indicator_count": 287,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ce47f0895a860febf8e",
      "name": "Error 403 access denied ?!?! URL https://myip.ms/#a",
      "description": "",
      "modified": "2023-12-06T15:01:56.022000",
      "created": "2023-12-06T15:01:56.022000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 45,
        "URL": 91,
        "domain": 18,
        "hostname": 23
      },
      "indicator_count": 177,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cb244b759b0ba42d5f3",
      "name": "217.160.83.245",
      "description": "",
      "modified": "2023-12-06T15:01:06.011000",
      "created": "2023-12-06T15:01:06.011000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 43,
        "URL": 484,
        "domain": 391,
        "hostname": 169
      },
      "indicator_count": 1087,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cb0c59f1e24288b50d2",
      "name": "Zhihu.com Hosting Whois Information - Zhihu.com",
      "description": "",
      "modified": "2023-12-06T15:01:04.066000",
      "created": "2023-12-06T15:01:04.066000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 48,
        "URL": 186,
        "domain": 34,
        "hostname": 74
      },
      "indicator_count": 342,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://alliant.it",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://alliant.it",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638290.2951021
}