{
  "type": "URL",
  "indicator": "https://allnet.cn",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://allnet.cn",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3920760654,
      "indicator": "https://allnet.cn",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "669e42fea462f0c8f8db32a1",
          "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
          "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
          "modified": "2024-08-21T11:03:59.106000",
          "created": "2024-07-22T11:31:10.391000",
          "tags": [
            "historical ssl",
            "referrer",
            "fancy bear",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "open",
            "status",
            "name servers",
            "creation date",
            "search",
            "proofpoint",
            "expiration date",
            "div div",
            "date",
            "accept",
            "next",
            "united",
            "cname",
            "asnone united",
            "a nxdomain",
            "domain",
            "united kingdom",
            "servers",
            "showing",
            "nxdomain",
            "dname",
            "whitelisted",
            "aaaa",
            "script urls",
            "costa rica",
            "script domains",
            "msie",
            "chrome",
            "unknown",
            "body",
            "gmt content",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "as8987 amazon",
            "as20940",
            "hostname",
            "gartner",
            "crowdstrike",
            "business value",
            "magic quadrant",
            "customer",
            "realized",
            "assessment",
            "economic impact",
            "complete",
            "february",
            "utc na",
            "ver2",
            "msclkidn",
            "html info",
            "meta tags",
            "mobileoptimized",
            "adobe dynamic",
            "tag management",
            "utc bing",
            "cobalt strike",
            "communications",
            "android device",
            "neutral",
            "win32 exe",
            "pe32",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "sections",
            "rticon neutral",
            "ico rtgroupicon",
            "xml rtmanifest",
            "overlay",
            "threat roundup",
            "pandas",
            "attacks against",
            "southeast",
            "wannacry kill",
            "switch dns",
            "query",
            "high level",
            "hackers",
            "unknown win",
            "core",
            "ascii text",
            "sha256",
            "sha1",
            "size",
            "pattern match",
            "suricata stream",
            "command decode",
            "utf8 text",
            "mitre att",
            "path",
            "hybrid",
            "starfield",
            "meta",
            "general",
            "target",
            "local",
            "click",
            "strings",
            "trident",
            "legacy",
            "main",
            "contact",
            "flow t1574",
            "dll sideloading",
            "create",
            "modify system",
            "process t1543",
            "windows service",
            "t1055 system",
            "pe file",
            "t1497 query",
            "may sleep",
            "allocate rwx",
            "get file",
            "access",
            "windows event",
            "allocate",
            "link function",
            "windows link",
            "contains pdb",
            "dns resolutions",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls tcp",
            "hashes",
            "user",
            "file system",
            "written c",
            "samplepath",
            "files dropped",
            "userprofile",
            "registry keys",
            "registry",
            "set registrya",
            "conhost",
            "comspec",
            "created",
            "temp",
            "windows",
            "displayname",
            "process",
            "commands",
            "signals mutexes",
            "mutexes",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "inc validity",
            "subject public",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net148",
            "net1480000",
            "as16509",
            "as22843",
            "as13916",
            "form",
            "server",
            "registrar abuse",
            "email",
            "request email",
            "verisign",
            "icann whois",
            "tech",
            "first",
            "project skynet",
            "cyber army",
            "dynamicloader",
            "high",
            "delete c",
            "show",
            "username",
            "medium",
            "default",
            "yara detections",
            "worm",
            "copy",
            "write",
            "duptwux",
            "malware",
            "x82xd4",
            "kx81xdbx0f",
            "x86xd3",
            "xa1xf1",
            "xe8xc2x14",
            "wx99xcdx11",
            "regsetvalueexa",
            "regbinary",
            "xe8xc6x13",
            "hx88x9ax1e",
            "stream",
            "win32",
            "persistence",
            "execution",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "ftp username",
            "contacted",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "null",
            "refresh",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "robtex",
            "apple ios",
            "apple",
            "domains",
            "co number",
            "virtual mobile",
            "logistics",
            "cyber defense",
            "twitter",
            "read c",
            "artemis",
            "intel",
            "steals",
            "virustotal",
            "python",
            "panda",
            "falcon sandbox",
            "analysis",
            "hybrid analysis",
            "submission name",
            "av detection",
            "multi scan",
            "highest",
            "ability",
            "execute",
            "upgrade",
            "intelligence",
            "learn",
            "reports",
            "logo analysis",
            "size17kib type",
            "command",
            "found",
            "layer protocol",
            "osi application",
            "ip address",
            "t1105 ingress",
            "tool transfer",
            "problems",
            "threat network",
            "infrastructure",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "startpage",
            "e1203 windows",
            "catalog tree",
            "analysis ob0001",
            "b0001 process",
            "b0003 delayed",
            "analysis ob0002",
            "evasion ob0006",
            "ob0007 system",
            "e1082 file",
            "e1083 impact",
            "data manipulation",
            "remote system",
            "discovery",
            "t1059 accept",
            "modules t1129",
            "enumerate",
            "as2914 ntt",
            "access denied",
            "as16625 akamai",
            "germany unknown",
            "csccorpdomains",
            "as31109",
            "invalid url",
            "mirai",
            "port",
            "destination",
            "bad login",
            "suspicious path",
            "nids",
            "tcp syn",
            "root account",
            "cve20185723",
            "as8068",
            "please",
            "x msedge",
            "embeddedwb",
            "windows nt",
            "tofsee",
            "push",
            "as54113",
            "as396982 google",
            "as31898 oracle",
            "moved",
            "encrypt"
          ],
          "references": [
            "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
            "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
            "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
            "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
            "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
            "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
            "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
            "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
            "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
            "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
            "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
            "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
            "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
            "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
            "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
            "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
            "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
            "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
            "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
            "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
            "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
            "http://images.contact.acams.org/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Trojan.Agent.FRYX",
              "display_name": "Trojan.Agent.FRYX",
              "target": null
            },
            {
              "id": "Win32:AceCrypter-B [Cryp]",
              "display_name": "Win32:AceCrypter-B [Cryp]",
              "target": null
            },
            {
              "id": "Mal_Tofsee",
              "display_name": "Mal_Tofsee",
              "target": null
            },
            {
              "id": "Ransom.StopcryptPMF.",
              "display_name": "Ransom.StopcryptPMF.",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Worm:Win32/Ganelp.A",
              "display_name": "Worm:Win32/Ganelp.A",
              "target": "/malware/Worm:Win32/Ganelp.A"
            },
            {
              "id": "trojan.shellrunner/emailworm",
              "display_name": "trojan.shellrunner/emailworm",
              "target": null
            },
            {
              "id": "trojan.redcap/python",
              "display_name": "trojan.redcap/python",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1565",
              "name": "Data Manipulation",
              "display_name": "T1565 - Data Manipulation"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 890,
            "FileHash-SHA1": 853,
            "FileHash-SHA256": 7215,
            "domain": 2771,
            "hostname": 5544,
            "URL": 13393,
            "email": 12,
            "SSLCertFingerprint": 15,
            "CIDR": 1,
            "CVE": 3
          },
          "indicator_count": 30697,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 237,
          "modified_text": "606 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66994bda3e150656cd5ac9dd",
          "name": "Browser Session Hijacking Various MyChart Phishing Scams",
          "description": "Ongoing issues with medical information hijacking. Various medical corporations affected. Tracking, medical, injection process, records retrieval, botnets.",
          "modified": "2024-08-17T16:01:11.866000",
          "created": "2024-07-18T17:07:38.719000",
          "tags": [
            "historical ssl",
            "referrer",
            "domains",
            "august",
            "phishingscams",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "privacy badger",
            "startpage",
            "self",
            "httponly",
            "samesitenone",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "pragma",
            "mychartlocale",
            "urls",
            "ip detections",
            "country",
            "contacted",
            "files",
            "file type",
            "name file",
            "gmbh",
            "cloudflare",
            "tucows",
            "ii llc",
            "alibaba cloud",
            "computing",
            "sample",
            "media t1091",
            "t1497 may",
            "mitre att",
            "access ta0001",
            "replication",
            "ta0004 process",
            "injection t1055",
            "defense evasion",
            "http requests",
            "get http",
            "request",
            "host",
            "dns resolutions",
            "ip traffic",
            "hashes",
            "tsara brashears",
            "red team",
            "hackers",
            "highly targeted",
            "critical risk",
            "cyberstalking",
            "apple",
            "apple ios",
            "logistics",
            "cyber defense",
            "guloader",
            "hacktool",
            "emotet",
            "phishing",
            "facebook",
            "malware",
            "hiddentear",
            "maze",
            "server",
            "domain status",
            "date",
            "algorithm",
            "google llc",
            "registrar abuse",
            "registrar",
            "record type",
            "ttl value",
            "aaaa",
            "whois lookup",
            "admin country",
            "ca creation",
            "dnssec",
            "markmonitor",
            "siblings",
            "whois lookups",
            "expiration date",
            "registrar iana",
            "creation date",
            "first",
            "united",
            "as15169 google",
            "cname",
            "status",
            "virtool",
            "cryp",
            "as396982 google",
            "search",
            "name servers",
            "win32",
            "remote"
          ],
          "references": [
            "MyChart Phishing Scams",
            "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
            "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win64-Trojan/Pakes.Exp",
              "display_name": "Win64-Trojan/Pakes.Exp",
              "target": null
            },
            {
              "id": "Win64:RansomX-gen",
              "display_name": "Win64:RansomX-gen",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 37,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 3473,
            "domain": 693,
            "URL": 4384,
            "hostname": 1610,
            "CVE": 2,
            "email": 3
          },
          "indicator_count": 10235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "610 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6696b803e3e4bfd92b52547a",
          "name": "click.bot",
          "description": "",
          "modified": "2024-08-15T18:03:45.531000",
          "created": "2024-07-16T18:12:18.670000",
          "tags": [
            "united",
            "a domains",
            "aaaa",
            "unknown",
            "script urls",
            "meta",
            "moved",
            "script domains",
            "super hentai",
            "passive dns",
            "body",
            "date",
            "porno",
            "as396982 google",
            "united kingdom",
            "servers",
            "search",
            "encirca",
            "creation date",
            "dnssec",
            "domain name",
            "next",
            "formbook",
            "historical ssl",
            "malicious",
            "july",
            "malware",
            "as22612",
            "entries",
            "date hash",
            "avast avg",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "sha1",
            "sha256",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "ascii text",
            "windows nt",
            "hybrid",
            "accept",
            "span",
            "general",
            "local",
            "click",
            "strings",
            "null",
            "contact"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1285,
            "email": 1,
            "hostname": 370,
            "URL": 1334,
            "FileHash-MD5": 80,
            "FileHash-SHA1": 80,
            "FileHash-SHA256": 802,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 3959,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "612 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66931e9dcfaa71b740418cbf",
          "name": "Hijacked YouTuber Channel/s Unauthorized Admin | admin2.6cv25r3l.sbs",
          "description": "Social engineering most likely led to this. This admin is also controlling phones, media, medical systems, etc. I cannot adequately put it in words.",
          "modified": "2024-08-12T23:00:18.687000",
          "created": "2024-07-14T00:41:01.944000",
          "tags": [
            "passive dns",
            "urls",
            "found",
            "gmt content",
            "scan endpoints",
            "all scoreblue",
            "pulse submit",
            "url analysis",
            "files",
            "error",
            "code",
            "domain",
            "name",
            "algorithm",
            "create date",
            "expiry date",
            "query time",
            "united",
            "update date",
            "update",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "date",
            "first",
            "technology",
            "dns replication",
            "form",
            "server",
            "request email",
            "registrar abuse",
            "verisign",
            "icann whois",
            "data",
            "whois database",
            "email",
            "tech",
            "primary root",
            "serial number",
            "sha256 code",
            "signing ca",
            "file version",
            "ca valid",
            "from",
            "thumbprint",
            "vs2008",
            "domains",
            "enom",
            "markmonitor inc",
            "ip detections",
            "country",
            "contacted",
            "win32 exe",
            "panmap",
            "text",
            "file type",
            "b file",
            "hostname",
            "pulse pulses",
            "sha1",
            "sha256",
            "mitre att",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "hybrid",
            "possible",
            "local",
            "click",
            "strings",
            "contact",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "reportto",
            "date fri",
            "unknown",
            "search",
            "showing",
            "as16276",
            "creation date",
            "emails",
            "name servers",
            "servers",
            "aaaa",
            "as15169 google",
            "gmt cache",
            "443 ma2592000",
            "ipv4",
            "asn as13335",
            "historical ssl",
            "threat roundup",
            "july",
            "ip check",
            "dns landscape",
            "iocs",
            "referrer",
            "youtube",
            "briansabey",
            "network",
            "attack",
            "cybercrime",
            "retaliation"
          ],
          "references": [
            "admin2.6cv25r3l.sbs, 6cv25r3l.sbs",
            "Network Related [ATT&CK ID T1566] Possible high-risk domain detected details Domain: \"admin2.6cv25r3l.sbs\" possible high risk indicator source",
            "https://hybrid-analysis.com/sample/22530e989e1d0e1121edd79cb620951b0a78dc0a4a1fb7ae07719ebb2f2414b0",
            "Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "\"Crowdsourced YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst Ruleset: \ufffc YARA ruleset cannot be loaded. Crowdsourced Sigma Rules CRITICAL 0 HIGH 2 MEDIUM 1 LOW 0 Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodo",
            "CSSR: Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community",
            "CSSR: Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "CS IDS rules: Matches rule ET MALWARE Tinba Checkin 2 | Matches rule ET MALWARE [PTsecurity] Tinba Checkin 4",
            "CS IDS rules: Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP traceroute",
            "CS IDS rules: Matches rule (eth) truncated ethernet header Matches rule PROTOCOL-ICMP PING Matches rule PROTOCOL-ICMP Echo Reply",
            "MALWARE BANKER EVADER",
            "CSR YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114.003",
              "name": "Email Forwarding Rule",
              "display_name": "T1114.003 - Email Forwarding Rule"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 595,
            "hostname": 244,
            "URL": 400,
            "FileHash-SHA256": 759,
            "FileHash-MD5": 78,
            "FileHash-SHA1": 75,
            "CIDR": 1,
            "email": 5
          },
          "indicator_count": 2157,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "614 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "CS IDS rules: Matches rule (eth) truncated ethernet header Matches rule PROTOCOL-ICMP PING Matches rule PROTOCOL-ICMP Echo Reply",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "\"Crowdsourced YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst Ruleset: \ufffc YARA ruleset cannot be loaded. Crowdsourced Sigma Rules CRITICAL 0 HIGH 2 MEDIUM 1 LOW 0 Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodo",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "MyChart Phishing Scams",
        "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
        "admin2.6cv25r3l.sbs, 6cv25r3l.sbs",
        "CSR YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst",
        "CS IDS rules: Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP traceroute",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "MALWARE BANKER EVADER",
        "CS IDS rules: Matches rule ET MALWARE Tinba Checkin 2 | Matches rule ET MALWARE [PTsecurity] Tinba Checkin 4",
        "CSSR: Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "Network Related [ATT&CK ID T1566] Possible high-risk domain detected details Domain: \"admin2.6cv25r3l.sbs\" possible high risk indicator source",
        "https://hybrid-analysis.com/sample/22530e989e1d0e1121edd79cb620951b0a78dc0a4a1fb7ae07719ebb2f2414b0",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "CSSR: Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "http://images.contact.acams.org/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan.agent.fryx",
            "Win64:ransomx-gen",
            "Nids",
            "Trojan.redcap/python",
            "Mirai",
            "Ransom.stopcryptpmf.",
            "Win32:acecrypter-b [cryp]",
            "Trojan.shellrunner/emailworm",
            "Worm:win32/ganelp.a",
            "Mal_tofsee",
            "Win64-trojan/pakes.exp",
            "Backdoor:win32/tofsee.t"
          ],
          "industries": [
            "Technology",
            "Healthcare"
          ],
          "unique_indicators": 46523
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/allnet.cn",
    "whois": "http://whois.domaintools.com/allnet.cn",
    "domain": "allnet.cn",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "669e42fea462f0c8f8db32a1",
      "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
      "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
      "modified": "2024-08-21T11:03:59.106000",
      "created": "2024-07-22T11:31:10.391000",
      "tags": [
        "historical ssl",
        "referrer",
        "fancy bear",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "reverse dns",
        "open",
        "status",
        "name servers",
        "creation date",
        "search",
        "proofpoint",
        "expiration date",
        "div div",
        "date",
        "accept",
        "next",
        "united",
        "cname",
        "asnone united",
        "a nxdomain",
        "domain",
        "united kingdom",
        "servers",
        "showing",
        "nxdomain",
        "dname",
        "whitelisted",
        "aaaa",
        "script urls",
        "costa rica",
        "script domains",
        "msie",
        "chrome",
        "unknown",
        "body",
        "gmt content",
        "all scoreblue",
        "pulse pulses",
        "entries",
        "as8987 amazon",
        "as20940",
        "hostname",
        "gartner",
        "crowdstrike",
        "business value",
        "magic quadrant",
        "customer",
        "realized",
        "assessment",
        "economic impact",
        "complete",
        "february",
        "utc na",
        "ver2",
        "msclkidn",
        "html info",
        "meta tags",
        "mobileoptimized",
        "adobe dynamic",
        "tag management",
        "utc bing",
        "cobalt strike",
        "communications",
        "android device",
        "neutral",
        "win32 exe",
        "pe32",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "sections",
        "rticon neutral",
        "ico rtgroupicon",
        "xml rtmanifest",
        "overlay",
        "threat roundup",
        "pandas",
        "attacks against",
        "southeast",
        "wannacry kill",
        "switch dns",
        "query",
        "high level",
        "hackers",
        "unknown win",
        "core",
        "ascii text",
        "sha256",
        "sha1",
        "size",
        "pattern match",
        "suricata stream",
        "command decode",
        "utf8 text",
        "mitre att",
        "path",
        "hybrid",
        "starfield",
        "meta",
        "general",
        "target",
        "local",
        "click",
        "strings",
        "trident",
        "legacy",
        "main",
        "contact",
        "flow t1574",
        "dll sideloading",
        "create",
        "modify system",
        "process t1543",
        "windows service",
        "t1055 system",
        "pe file",
        "t1497 query",
        "may sleep",
        "allocate rwx",
        "get file",
        "access",
        "windows event",
        "allocate",
        "link function",
        "windows link",
        "contains pdb",
        "dns resolutions",
        "ip traffic",
        "pattern domains",
        "memory pattern",
        "urls tcp",
        "hashes",
        "user",
        "file system",
        "written c",
        "samplepath",
        "files dropped",
        "userprofile",
        "registry keys",
        "registry",
        "set registrya",
        "conhost",
        "comspec",
        "created",
        "temp",
        "windows",
        "displayname",
        "process",
        "commands",
        "signals mutexes",
        "mutexes",
        "full name",
        "data",
        "v3 serial",
        "number",
        "cus cndigicert",
        "tls rsa",
        "ca1 odigicert",
        "inc validity",
        "subject public",
        "certificate",
        "whois lookup",
        "netrange",
        "nethandle",
        "net148",
        "net1480000",
        "as16509",
        "as22843",
        "as13916",
        "form",
        "server",
        "registrar abuse",
        "email",
        "request email",
        "verisign",
        "icann whois",
        "tech",
        "first",
        "project skynet",
        "cyber army",
        "dynamicloader",
        "high",
        "delete c",
        "show",
        "username",
        "medium",
        "default",
        "yara detections",
        "worm",
        "copy",
        "write",
        "duptwux",
        "malware",
        "x82xd4",
        "kx81xdbx0f",
        "x86xd3",
        "xa1xf1",
        "xe8xc2x14",
        "wx99xcdx11",
        "regsetvalueexa",
        "regbinary",
        "xe8xc6x13",
        "hx88x9ax1e",
        "stream",
        "win32",
        "persistence",
        "execution",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "ftp username",
        "contacted",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "severity",
        "null",
        "refresh",
        "span",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "robtex",
        "apple ios",
        "apple",
        "domains",
        "co number",
        "virtual mobile",
        "logistics",
        "cyber defense",
        "twitter",
        "read c",
        "artemis",
        "intel",
        "steals",
        "virustotal",
        "python",
        "panda",
        "falcon sandbox",
        "analysis",
        "hybrid analysis",
        "submission name",
        "av detection",
        "multi scan",
        "highest",
        "ability",
        "execute",
        "upgrade",
        "intelligence",
        "learn",
        "reports",
        "logo analysis",
        "size17kib type",
        "command",
        "found",
        "layer protocol",
        "osi application",
        "ip address",
        "t1105 ingress",
        "tool transfer",
        "problems",
        "threat network",
        "infrastructure",
        "domains part",
        "domain tracker",
        "roundup",
        "new problems",
        "startpage",
        "e1203 windows",
        "catalog tree",
        "analysis ob0001",
        "b0001 process",
        "b0003 delayed",
        "analysis ob0002",
        "evasion ob0006",
        "ob0007 system",
        "e1082 file",
        "e1083 impact",
        "data manipulation",
        "remote system",
        "discovery",
        "t1059 accept",
        "modules t1129",
        "enumerate",
        "as2914 ntt",
        "access denied",
        "as16625 akamai",
        "germany unknown",
        "csccorpdomains",
        "as31109",
        "invalid url",
        "mirai",
        "port",
        "destination",
        "bad login",
        "suspicious path",
        "nids",
        "tcp syn",
        "root account",
        "cve20185723",
        "as8068",
        "please",
        "x msedge",
        "embeddedwb",
        "windows nt",
        "tofsee",
        "push",
        "as54113",
        "as396982 google",
        "as31898 oracle",
        "moved",
        "encrypt"
      ],
      "references": [
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "http://images.contact.acams.org/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "Trojan.Agent.FRYX",
          "display_name": "Trojan.Agent.FRYX",
          "target": null
        },
        {
          "id": "Win32:AceCrypter-B [Cryp]",
          "display_name": "Win32:AceCrypter-B [Cryp]",
          "target": null
        },
        {
          "id": "Mal_Tofsee",
          "display_name": "Mal_Tofsee",
          "target": null
        },
        {
          "id": "Ransom.StopcryptPMF.",
          "display_name": "Ransom.StopcryptPMF.",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Worm:Win32/Ganelp.A",
          "display_name": "Worm:Win32/Ganelp.A",
          "target": "/malware/Worm:Win32/Ganelp.A"
        },
        {
          "id": "trojan.shellrunner/emailworm",
          "display_name": "trojan.shellrunner/emailworm",
          "target": null
        },
        {
          "id": "trojan.redcap/python",
          "display_name": "trojan.redcap/python",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1569",
          "name": "System Services",
          "display_name": "T1569 - System Services"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1565",
          "name": "Data Manipulation",
          "display_name": "T1565 - Data Manipulation"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1202",
          "name": "Indirect Command Execution",
          "display_name": "T1202 - Indirect Command Execution"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 890,
        "FileHash-SHA1": 853,
        "FileHash-SHA256": 7215,
        "domain": 2771,
        "hostname": 5544,
        "URL": 13393,
        "email": 12,
        "SSLCertFingerprint": 15,
        "CIDR": 1,
        "CVE": 3
      },
      "indicator_count": 30697,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 237,
      "modified_text": "606 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66994bda3e150656cd5ac9dd",
      "name": "Browser Session Hijacking Various MyChart Phishing Scams",
      "description": "Ongoing issues with medical information hijacking. Various medical corporations affected. Tracking, medical, injection process, records retrieval, botnets.",
      "modified": "2024-08-17T16:01:11.866000",
      "created": "2024-07-18T17:07:38.719000",
      "tags": [
        "historical ssl",
        "referrer",
        "domains",
        "august",
        "phishingscams",
        "domains part",
        "domain tracker",
        "roundup",
        "new problems",
        "privacy badger",
        "startpage",
        "self",
        "httponly",
        "samesitenone",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "pragma",
        "mychartlocale",
        "urls",
        "ip detections",
        "country",
        "contacted",
        "files",
        "file type",
        "name file",
        "gmbh",
        "cloudflare",
        "tucows",
        "ii llc",
        "alibaba cloud",
        "computing",
        "sample",
        "media t1091",
        "t1497 may",
        "mitre att",
        "access ta0001",
        "replication",
        "ta0004 process",
        "injection t1055",
        "defense evasion",
        "http requests",
        "get http",
        "request",
        "host",
        "dns resolutions",
        "ip traffic",
        "hashes",
        "tsara brashears",
        "red team",
        "hackers",
        "highly targeted",
        "critical risk",
        "cyberstalking",
        "apple",
        "apple ios",
        "logistics",
        "cyber defense",
        "guloader",
        "hacktool",
        "emotet",
        "phishing",
        "facebook",
        "malware",
        "hiddentear",
        "maze",
        "server",
        "domain status",
        "date",
        "algorithm",
        "google llc",
        "registrar abuse",
        "registrar",
        "record type",
        "ttl value",
        "aaaa",
        "whois lookup",
        "admin country",
        "ca creation",
        "dnssec",
        "markmonitor",
        "siblings",
        "whois lookups",
        "expiration date",
        "registrar iana",
        "creation date",
        "first",
        "united",
        "as15169 google",
        "cname",
        "status",
        "virtool",
        "cryp",
        "as396982 google",
        "search",
        "name servers",
        "win32",
        "remote"
      ],
      "references": [
        "MyChart Phishing Scams",
        "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
        "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win64-Trojan/Pakes.Exp",
          "display_name": "Win64-Trojan/Pakes.Exp",
          "target": null
        },
        {
          "id": "Win64:RansomX-gen",
          "display_name": "Win64:RansomX-gen",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 37,
        "FileHash-SHA1": 33,
        "FileHash-SHA256": 3473,
        "domain": 693,
        "URL": 4384,
        "hostname": 1610,
        "CVE": 2,
        "email": 3
      },
      "indicator_count": 10235,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "610 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6696b803e3e4bfd92b52547a",
      "name": "click.bot",
      "description": "",
      "modified": "2024-08-15T18:03:45.531000",
      "created": "2024-07-16T18:12:18.670000",
      "tags": [
        "united",
        "a domains",
        "aaaa",
        "unknown",
        "script urls",
        "meta",
        "moved",
        "script domains",
        "super hentai",
        "passive dns",
        "body",
        "date",
        "porno",
        "as396982 google",
        "united kingdom",
        "servers",
        "search",
        "encirca",
        "creation date",
        "dnssec",
        "domain name",
        "next",
        "formbook",
        "historical ssl",
        "malicious",
        "july",
        "malware",
        "as22612",
        "entries",
        "date hash",
        "avast avg",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "sha1",
        "sha256",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "ascii text",
        "windows nt",
        "hybrid",
        "accept",
        "span",
        "general",
        "local",
        "click",
        "strings",
        "null",
        "contact"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1285,
        "email": 1,
        "hostname": 370,
        "URL": 1334,
        "FileHash-MD5": 80,
        "FileHash-SHA1": 80,
        "FileHash-SHA256": 802,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 3959,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "612 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66931e9dcfaa71b740418cbf",
      "name": "Hijacked YouTuber Channel/s Unauthorized Admin | admin2.6cv25r3l.sbs",
      "description": "Social engineering most likely led to this. This admin is also controlling phones, media, medical systems, etc. I cannot adequately put it in words.",
      "modified": "2024-08-12T23:00:18.687000",
      "created": "2024-07-14T00:41:01.944000",
      "tags": [
        "passive dns",
        "urls",
        "found",
        "gmt content",
        "scan endpoints",
        "all scoreblue",
        "pulse submit",
        "url analysis",
        "files",
        "error",
        "code",
        "domain",
        "name",
        "algorithm",
        "create date",
        "expiry date",
        "query time",
        "united",
        "update date",
        "update",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "date",
        "first",
        "technology",
        "dns replication",
        "form",
        "server",
        "request email",
        "registrar abuse",
        "verisign",
        "icann whois",
        "data",
        "whois database",
        "email",
        "tech",
        "primary root",
        "serial number",
        "sha256 code",
        "signing ca",
        "file version",
        "ca valid",
        "from",
        "thumbprint",
        "vs2008",
        "domains",
        "enom",
        "markmonitor inc",
        "ip detections",
        "country",
        "contacted",
        "win32 exe",
        "panmap",
        "text",
        "file type",
        "b file",
        "hostname",
        "pulse pulses",
        "sha1",
        "sha256",
        "mitre att",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "hybrid",
        "possible",
        "local",
        "click",
        "strings",
        "contact",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "reportto",
        "date fri",
        "unknown",
        "search",
        "showing",
        "as16276",
        "creation date",
        "emails",
        "name servers",
        "servers",
        "aaaa",
        "as15169 google",
        "gmt cache",
        "443 ma2592000",
        "ipv4",
        "asn as13335",
        "historical ssl",
        "threat roundup",
        "july",
        "ip check",
        "dns landscape",
        "iocs",
        "referrer",
        "youtube",
        "briansabey",
        "network",
        "attack",
        "cybercrime",
        "retaliation"
      ],
      "references": [
        "admin2.6cv25r3l.sbs, 6cv25r3l.sbs",
        "Network Related [ATT&CK ID T1566] Possible high-risk domain detected details Domain: \"admin2.6cv25r3l.sbs\" possible high risk indicator source",
        "https://hybrid-analysis.com/sample/22530e989e1d0e1121edd79cb620951b0a78dc0a4a1fb7ae07719ebb2f2414b0",
        "Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "\"Crowdsourced YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst Ruleset: \ufffc YARA ruleset cannot be loaded. Crowdsourced Sigma Rules CRITICAL 0 HIGH 2 MEDIUM 1 LOW 0 Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodo",
        "CSSR: Matches rule Remote Thread Creation By Uncommon Source Image by Perez Diego (@darkquassar), oscd.community",
        "CSSR: Matches rule Remote Thread Creation In Uncommon Target Image by Florian Roth (Nextron Systems) Matches rule CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "CS IDS rules: Matches rule ET MALWARE Tinba Checkin 2 | Matches rule ET MALWARE [PTsecurity] Tinba Checkin 4",
        "CS IDS rules: Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP traceroute",
        "CS IDS rules: Matches rule (eth) truncated ethernet header Matches rule PROTOCOL-ICMP PING Matches rule PROTOCOL-ICMP Echo Reply",
        "MALWARE BANKER EVADER",
        "CSR YARA rules: Matches rule aPLib_decompression from ruleset aPLib_decompression by @r3c0nst"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114.003",
          "name": "Email Forwarding Rule",
          "display_name": "T1114.003 - Email Forwarding Rule"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 595,
        "hostname": 244,
        "URL": 400,
        "FileHash-SHA256": 759,
        "FileHash-MD5": 78,
        "FileHash-SHA1": 75,
        "CIDR": 1,
        "email": 5
      },
      "indicator_count": 2157,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "614 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://allnet.cn",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://allnet.cn",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629361.321706
}