{
  "type": "URL",
  "indicator": "https://animesharke.cf",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://animesharke.cf",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3159999828,
      "indicator": "https://animesharke.cf",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 33,
      "pulses": [
        {
          "id": "69a9cd444aa144401d0c4988",
          "name": "Pools Open",
          "description": "",
          "modified": "2026-04-15T19:21:28.851000",
          "created": "2026-03-05T18:36:52.014000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 8098,
            "URL": 23428,
            "hostname": 9592,
            "domain": 4727,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 696,
            "FileHash-SHA1": 457,
            "CIDR": 78,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 47103,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a9cad6633206ba1204cf8f",
          "name": "clone school board ",
          "description": "",
          "modified": "2026-03-06T11:26:19.137000",
          "created": "2026-03-05T18:26:30.062000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6211397913dcdae410959042",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2975,
            "URL": 9041,
            "domain": 2214,
            "FileHash-SHA256": 3044,
            "FileHash-MD5": 280,
            "FileHash-SHA1": 327,
            "CIDR": 6,
            "email": 64,
            "CVE": 24,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 17981,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "44 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a9cad78745fdea3001aec9",
          "name": "clone school board ",
          "description": "",
          "modified": "2026-03-06T05:11:24.929000",
          "created": "2026-03-05T18:26:31.303000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6211397913dcdae410959042",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2975,
            "URL": 9041,
            "domain": 2214,
            "FileHash-SHA256": 3044,
            "FileHash-MD5": 280,
            "FileHash-SHA1": 327,
            "CIDR": 6,
            "email": 64,
            "CVE": 24,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 17981,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "45 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "5fa57698ac0f6638b7b9a8ba",
          "name": "Pool's Closed",
          "description": "Two paupers from the meadow spring forth an upheaval of nasty sites on the world wide web.",
          "modified": "2025-12-27T05:02:34.910000",
          "created": "2020-11-06T16:15:20.139000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 61,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 4,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 8098,
            "URL": 23426,
            "hostname": 9590,
            "domain": 4727,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 696,
            "FileHash-SHA1": 457,
            "CIDR": 78,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 47099,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 133,
          "modified_text": "114 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "682d38446ea0d643bdde30c9",
          "name": "hxxps://eduroam[.]org",
          "description": "Surface analysis of another related thing - will update later",
          "modified": "2025-06-20T02:05:09.642000",
          "created": "2025-05-21T02:19:48.419000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "virus",
            "ransomware",
            "static",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "platform",
            "ansi",
            "pcap",
            "pcap processing",
            "win64",
            "khtml",
            "gecko",
            "brand",
            "windows nt",
            "microsoft edge",
            "prefetch8 ansi",
            "cookie",
            "date",
            "mozilla",
            "accept",
            "window",
            "wind",
            "suspicious",
            "mozi",
            "bran",
            "dest",
            "hybrid",
            "comspec",
            "close",
            "click",
            "hosts",
            "general",
            "path",
            "model",
            "strings",
            "contact",
            "server",
            "redacted tech",
            "redacted admin",
            "host name",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "dnssec",
            "code",
            "javascript",
            "passive dns",
            "replication",
            "subdomains",
            "UAlberta",
            "Eduroam"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720",
            "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/overview",
            "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/geolocation",
            "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720/682d2dcbc068830c1403398c",
            "https://www.virustotal.com/gui/domain/eduroam.org/details",
            "https://www.virustotal.com/gui/domain/eduroam.org/relations"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [
            "Telecommunications",
            "Education"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 288,
            "domain": 80,
            "email": 6,
            "FileHash-MD5": 15,
            "FileHash-SHA1": 13,
            "FileHash-SHA256": 96,
            "SSLCertFingerprint": 8,
            "hostname": 78,
            "CIDR": 2
          },
          "indicator_count": 586,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "304 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6647908c09468f42bc1249f1",
          "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
          "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
          "modified": "2025-03-01T04:59:57.222000",
          "created": "2024-05-17T17:14:52.317000",
          "tags": [
            "false",
            "true",
            "visible",
            "application",
            "microsoft teams",
            "microsoft azure",
            "office",
            "service",
            "dynamics",
            "hidden",
            "android",
            "explorer",
            "write",
            "connector",
            "test",
            "sharepoint",
            "live",
            "meister",
            "tools",
            "desktop",
            "spark",
            "front",
            "enterprise",
            "designer",
            "atlas",
            "premium",
            "assistant",
            "allow",
            "azureadmyorg",
            "game",
            "verify",
            "microsoft power",
            "channelsurfcli",
            "mtd1",
            "file transfer",
            "magnus",
            "microsoft crm",
            "youth"
          ],
          "references": [
            "All - EnterpriseAppsList.csv",
            "AppRegistrationList.csv",
            "https://tria.ge/240517-vc7c1shc62/behavioral1",
            "https://tria.ge/240517-vdwb5shc71/behavioral1",
            "https://tria.ge/240517-vqxezaaa33/behavioral1",
            "https://tria.ge/240517-t9pc2ahb2t",
            "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
            "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
            "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
            "Thor Scan: S-I9VvMTB6cZU",
            "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
            "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
            "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
            "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
            "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
            "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
            "https://tria.ge/240521-q4s79agb25/static1",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
            "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
            "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
            "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
            "https://www.hudsonrock.com/search?domain=ualberta.ca",
            "https://www.criminalip.io/domain/report?scan_id=13798622",
            "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
            "https://urlscan.io/search/#ualberta.ca",
            "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
            "https://sitereport.netcraft.com/?url=http://ualberta.ca",
            "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
            "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
            "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
            "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 7,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1703,
            "FileHash-SHA256": 90472,
            "URL": 99185,
            "domain": 82954,
            "hostname": 39041,
            "FileHash-SHA1": 1624,
            "email": 4658,
            "CVE": 12
          },
          "indicator_count": 319649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "678dd7c763b29de06765fb52",
          "name": "hxxps://www[.]unitedconservative[.]ca/ - 01.19.25",
          "description": "Alberta UCP Compromise (i.e. potential evidence of active foreign interference).\n\nhttps://www.virustotal.com/graph/embed/g3fdc926b2208411e8b138e8bd7069b721b2586a3a1b3445aa4f70a932701ccbe?theme=dark",
          "modified": "2025-02-19T05:02:21.540000",
          "created": "2025-01-20T04:57:43.300000",
          "tags": [
            "pentester",
            "javascript",
            "completed",
            "risk",
            "load",
            "web application",
            "firewall",
            "google search",
            "ssl certificate",
            "http",
            "create account",
            "critical",
            "malware",
            "virus",
            "trojan",
            "ransomware",
            "static",
            "analysis",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "online",
            "submit",
            "sample",
            "download",
            "platform",
            "eci3",
            "eci4",
            "p1737345680749",
            "gaz1",
            "uaax86",
            "uab64",
            "sid1737345681",
            "sct1",
            "seg0",
            "nsi1",
            "url",
            "sandbox",
            "scanner",
            "reputation",
            "phishing",
            "hash",
            "miss",
            "eval",
            "first seen",
            "fastly",
            "gmt file",
            "linux x8664",
            "accept",
            "fingerprint",
            "loading",
            "path",
            "patch",
            "write",
            "vxstream",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please"
          ],
          "references": [
            "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
            "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
            "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
            "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe",
            "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 734,
            "domain": 486,
            "email": 8,
            "hostname": 346,
            "FileHash-SHA256": 1814,
            "FileHash-MD5": 363,
            "FileHash-SHA1": 361,
            "SSLCertFingerprint": 24
          },
          "indicator_count": 4136,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 129,
          "modified_text": "425 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f3e394bcf868816a29c2dc",
          "name": "Google Pixel 7a Devices - Telus ISP devices 'protected' by Norton",
          "description": "Exactly as above. I mean, out of all of the phones these ones make phonecalls (most of the time can send & receive calls). Can be a little tricky. Incomplete - it be doing it's own thing downloading/uploading stuff and heading down the 'way all the other phones went' route.",
          "modified": "2024-11-02T15:05:54.240000",
          "created": "2024-03-15T05:58:44.839000",
          "tags": [
            "ISP",
            "Google",
            "Telus",
            "Norton",
            "Pixel"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/summary",
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
            "https://www.virustotal.com/graph/embed/ga590434b8e274dc99fd39dd298c8c786abff51132c8d4646bb3fb3f1f4c3d100?theme=dark",
            "https://www.virustotal.com/graph/embed/g16457cd5ead246d99d2ecf37b965641b258cffddb8374ad194cdea194868d1ec?theme=dark",
            "https://www.virustotal.com/graph/embed/g2ef035cd31754a649909336c174aa141b9cca7e431994d12969e0d9d73a01b71?theme=dark",
            "https://www.virustotal.com/graph/embed/g1ea71614909243c1a291970fa39651a2d169deef25b7418fab2f0299221eb152?theme=dark",
            "https://www.virustotal.com/graph/embed/g20d14d97883a4127a500c45fcfb6e3e4961a30ef4bf74db7ab918bcbdb3f476b?theme=dark",
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
            "",
            "https://www.filescan.io/uploads/66feb74d83903120b70c820f/reports/0a3a6c27-a872-4e0c-86a4-0fc690fb5ecd/details",
            "https://tip.neiki.dev/file/fb0b66efe3b780270db0693b6df42dd08068428b86fc1a579fe5117d4ae76e07/network",
            "http://www.hybrid-analysis.com/file-collection/66febb8ee0244a7af5014d61"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Telecommunications",
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1231,
            "FileHash-SHA1": 1215,
            "FileHash-SHA256": 99653,
            "URL": 158638,
            "domain": 49468,
            "hostname": 77233,
            "email": 6,
            "CIDR": 5450,
            "CVE": 55
          },
          "indicator_count": 392949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "533 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a48b6ea16eeb6b54dfad7c",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears",
          "description": "",
          "modified": "2024-01-15T01:33:34.790000",
          "created": "2024-01-15T01:33:34.790000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6590f9b6b1fe0330c655c25f",
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "826 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f9b6b1fe0330c655c25f",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears ",
          "description": "",
          "modified": "2023-12-31T05:18:46.519000",
          "created": "2023-12-31T05:18:46.519000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "658741502e029e25c7152cc0",
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "841 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658741502e029e25c7152cc0",
          "name": "busted hijacking",
          "description": "",
          "modified": "2023-12-23T20:21:36.641000",
          "created": "2023-12-23T20:21:36.641000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Machidian45",
            "id": "262704",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 32,
          "modified_text": "848 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6587414f2e029e25c7152cbf",
          "name": "busted hijacking",
          "description": "",
          "modified": "2023-12-23T20:21:35.725000",
          "created": "2023-12-23T20:21:35.725000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Machidian45",
            "id": "262704",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "848 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544c7a11d7541bdb3bfe5ff",
          "name": "Radar Ineractive. Law Firm responsible for cyber crime.",
          "description": "Is this legal.  Attorney from Hall Render law firm cyber stalking  and malvertizing targets in adult content, dungeons, death scenarios, suicide threats? Pulse auto populates targets: Tsara Brashears 'alleged'  SA victim. This may not be the forum for my , death threats should always be investigated as should allegations of assault. Malware, BotNet, car and phone tracking, monitoring, injection,   .gov is found throughout. Monitoring of Safebae.org; online movement began by now deceased 'alleged' SA victim, Daisy Coleman of Audrey & Daisy.  High Risk surviving target. Crazy cover up? Each target seems to have a state government power 'implicated' in attack. \n\nEd Said",
          "modified": "2023-12-16T19:40:11.047000",
          "created": "2023-11-03T10:12:49.539000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1644,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13455,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a161f0681f4ff3d67feb",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-12-06T16:29:21.844000",
          "created": "2023-12-06T16:29:21.844000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a145926a5676de0e2a1a",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-12-06T16:28:53.979000",
          "created": "2023-12-06T16:28:53.979000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b5b677d3eefac9f6186",
          "name": "IPS_IOC",
          "description": "",
          "modified": "2023-12-06T14:55:23.515000",
          "created": "2023-12-06T14:55:23.515000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 162,
            "URL": 43,
            "hostname": 29,
            "domain": 24,
            "FileHash-MD5": 100,
            "FileHash-SHA1": 100
          },
          "indicator_count": 458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b58c7b19b62c5016019",
          "name": "ips from tuygas",
          "description": "",
          "modified": "2023-12-06T14:55:20.815000",
          "created": "2023-12-06T14:55:20.815000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 162,
            "URL": 43,
            "hostname": 27,
            "domain": 24
          },
          "indicator_count": 256,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e9819da1f2e8e26e78e",
          "name": "recallsfschoolboard.org",
          "description": "",
          "modified": "2023-12-06T14:00:56.019000",
          "created": "2023-12-06T14:00:56.019000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 24,
            "domain": 2214,
            "URL": 9040,
            "FileHash-MD5": 280,
            "FileHash-SHA256": 3044,
            "hostname": 2973,
            "FileHash-SHA1": 327,
            "SSLCertFingerprint": 6,
            "CIDR": 6,
            "email": 64
          },
          "indicator_count": 17978,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707b9630308cb99a817277",
          "name": "Pool's Closed",
          "description": "",
          "modified": "2023-12-06T13:48:06.514000",
          "created": "2023-12-06T13:48:06.514000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a94d1bdedd646afda170d",
          "name": "Resources Hijacking by Attorney 11_03_2023",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-12-02T02:22:09.814000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6546d206936ee17a0828d9c9",
          "name": "Deptlock Browser Compromise attack initiated by malicious (SOC) Partner ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T23:21:42.110000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545bda27bd3a147ebac71a8",
          "name": "CNC Feodo Tracker | Resources Hijacking by Attorney ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T03:42:26.978000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 57,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545a303731b2df439eb1a3b",
          "name": "Occamy Remote PC / Device Control",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T01:48:51.255000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65459cbd3069e99e327642b6",
          "name": "Resources Hijacking ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T01:22:05.691000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544d9b0f9b23205eb355210",
          "name": "Resources Hijacking by Attorney  11_03_2023",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-03T11:29:52.652000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544c99af21a2fde7bd6927e",
          "name": "Occamy Remote PC / Device Control ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-03T10:21:14.428000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f37719db054ccde25aa9df",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-09-02T17:55:37.269000",
          "created": "2023-09-02T17:55:37.269000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7851,
            "URL": 23098,
            "hostname": 9521,
            "domain": 4595,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 564,
            "FileHash-SHA1": 432,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 46120,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "960 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f3771616d9a9891947e4df",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-09-02T17:55:34.095000",
          "created": "2023-09-02T17:55:34.095000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7851,
            "URL": 23098,
            "hostname": 9521,
            "domain": 4595,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 564,
            "FileHash-SHA1": 432,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 46120,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "960 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6250055e696acbb40033eaea",
          "name": "IPS_IOC",
          "description": "",
          "modified": "2022-05-08T00:03:14.586000",
          "created": "2022-04-08T09:50:22.996000",
          "tags": [
            "filehashsha256",
            "ipv4",
            "ccus asnas15169",
            "google",
            "ccus asnas3356",
            "level3",
            "ccde asnas24429",
            "zhejiang taobao",
            "indicator",
            "description"
          ],
          "references": [
            "624ffdc5d5dce64fdb04b974.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tthanhtung643@gmail.com",
            "id": "187831",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 100,
            "FileHash-SHA1": 100,
            "FileHash-SHA256": 162,
            "URL": 43,
            "domain": 24,
            "hostname": 29
          },
          "indicator_count": 458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 42,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624ffdc5d5dce64fdb04b974",
          "name": "ips from tuygas",
          "description": "Here is the full text of the above, full-length graphic, which shows the results of a test on Google.com's live web browser, using a built-in virtual reality system.",
          "modified": "2022-05-08T00:03:14.586000",
          "created": "2022-04-08T09:17:57.712000",
          "tags": [
            "span",
            "unknown",
            "unsafe",
            "ip addresses",
            "timeshift",
            "status",
            "domain"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AIDefenseNet",
            "id": "102874",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 27,
            "URL": 43,
            "domain": 24,
            "FileHash-SHA256": 162
          },
          "indicator_count": 256,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 105,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6211397913dcdae410959042",
          "name": "recallsfschoolboard.org",
          "description": "garry tan has no hand",
          "modified": "2022-03-26T19:02:17.827000",
          "created": "2022-02-19T18:39:53.002000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2973,
            "URL": 9040,
            "domain": 2214,
            "FileHash-SHA256": 3044,
            "FileHash-MD5": 280,
            "FileHash-SHA1": 327,
            "CIDR": 6,
            "email": 64,
            "CVE": 24,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 17978,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1485 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://www.virustotal.com/graph/embed/g1ea71614909243c1a291970fa39651a2d169deef25b7418fab2f0299221eb152?theme=dark",
        "https://www.virustotal.com/graph/embed/g20d14d97883a4127a500c45fcfb6e3e4961a30ef4bf74db7ab918bcbdb3f476b?theme=dark",
        "https://tip.neiki.dev/file/fb0b66efe3b780270db0693b6df42dd08068428b86fc1a579fe5117d4ae76e07/network",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "http://www.hallrender.com/resources/blog/",
        "AppRegistrationList.csv",
        "https://www.filescan.io/uploads/66feb74d83903120b70c820f/reports/0a3a6c27-a872-4e0c-86a4-0fc690fb5ecd/details",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/geolocation",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "624ffdc5d5dce64fdb04b974.csv",
        "https://www.virustotal.com/gui/domain/eduroam.org/details",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "Research",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List",
        "All - EnterpriseAppsList.csv",
        "https://www.virustotal.com/graph/embed/g16457cd5ead246d99d2ecf37b965641b258cffddb8374ad194cdea194868d1ec?theme=dark",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
        "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720",
        "Pool's Closed",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "Hybrid Analysis",
        "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/overview",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/summary",
        "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe",
        "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
        "https://www.hallrender.com/attorney/brian-sabey",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://www.virustotal.com/graph/embed/ga590434b8e274dc99fd39dd298c8c786abff51132c8d4646bb3fb3f1f4c3d100?theme=dark",
        "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720/682d2dcbc068830c1403398c",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
        "http://benjamin.xww.de/",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "poemhunter.com",
        "safebae.org",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "wTools",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://www.virustotal.com/graph/embed/g2ef035cd31754a649909336c174aa141b9cca7e431994d12969e0d9d73a01b71?theme=dark",
        "Pool Closed",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://www.virustotal.com/gui/domain/eduroam.org/relations",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "http://www.hybrid-analysis.com/file-collection/66febb8ee0244a7af5014d61"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Tulach | Mark Brian Sabey | Hall Render Law Firm"
          ],
          "malware_families": [
            "Radar ineractive",
            "Systweak",
            "Webtoolbar",
            "Slfper:browsermodifier:win32/mediamagnet",
            "Vidar",
            "Redline",
            "Noname057",
            "Emotet",
            "Trojanspy",
            "Occamy",
            "Yixun",
            "Zpevdo",
            "Domains",
            "Maltiverse",
            "Tiggre",
            "Formbook",
            "Darkside .beware",
            "Wacatac",
            "Inmortal",
            "Br",
            "Nanocore rat",
            "Nymaim",
            "Opencandy",
            "Xrat",
            "Suppobox",
            "Feodo tracker",
            "Tulach malware",
            "Iobit",
            "Rms",
            "Cutwail",
            "Zbot",
            "Agent tesla",
            "Virut",
            "Sality",
            "Hsbc"
          ],
          "industries": [
            "Media",
            "Ad fraud",
            "Telecommunications",
            "Education",
            "Technology",
            "Government",
            "Healthcare",
            "Health"
          ],
          "unique_indicators": 161963
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/animesharke.cf",
    "whois": "http://whois.domaintools.com/animesharke.cf",
    "domain": "animesharke.cf",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 33,
  "pulses": [
    {
      "id": "69a9cd444aa144401d0c4988",
      "name": "Pools Open",
      "description": "",
      "modified": "2026-04-15T19:21:28.851000",
      "created": "2026-03-05T18:36:52.014000",
      "tags": [
        "Timothy Pool",
        "Christopher Pool",
        "Pool's Closed"
      ],
      "references": [
        "Pool Closed",
        "Pool's Closed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Media",
        "ad fraud"
      ],
      "TLP": "white",
      "cloned_from": "5fa57698ac0f6638b7b9a8ba",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 8098,
        "URL": 23428,
        "hostname": 9592,
        "domain": 4727,
        "SSLCertFingerprint": 22,
        "FileHash-MD5": 696,
        "FileHash-SHA1": 457,
        "CIDR": 78,
        "email": 3,
        "CVE": 2
      },
      "indicator_count": 47103,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a9cad6633206ba1204cf8f",
      "name": "clone school board ",
      "description": "",
      "modified": "2026-03-06T11:26:19.137000",
      "created": "2026-03-05T18:26:30.062000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6211397913dcdae410959042",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2975,
        "URL": 9041,
        "domain": 2214,
        "FileHash-SHA256": 3044,
        "FileHash-MD5": 280,
        "FileHash-SHA1": 327,
        "CIDR": 6,
        "email": 64,
        "CVE": 24,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 17981,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "44 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a9cad78745fdea3001aec9",
      "name": "clone school board ",
      "description": "",
      "modified": "2026-03-06T05:11:24.929000",
      "created": "2026-03-05T18:26:31.303000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6211397913dcdae410959042",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2975,
        "URL": 9041,
        "domain": 2214,
        "FileHash-SHA256": 3044,
        "FileHash-MD5": 280,
        "FileHash-SHA1": 327,
        "CIDR": 6,
        "email": 64,
        "CVE": 24,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 17981,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "45 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "5fa57698ac0f6638b7b9a8ba",
      "name": "Pool's Closed",
      "description": "Two paupers from the meadow spring forth an upheaval of nasty sites on the world wide web.",
      "modified": "2025-12-27T05:02:34.910000",
      "created": "2020-11-06T16:15:20.139000",
      "tags": [
        "Timothy Pool",
        "Christopher Pool",
        "Pool's Closed"
      ],
      "references": [
        "Pool Closed",
        "Pool's Closed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Media",
        "ad fraud"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 61,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 4,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scnrscnr",
        "id": "126475",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 8098,
        "URL": 23426,
        "hostname": 9590,
        "domain": 4727,
        "SSLCertFingerprint": 22,
        "FileHash-MD5": 696,
        "FileHash-SHA1": 457,
        "CIDR": 78,
        "email": 3,
        "CVE": 2
      },
      "indicator_count": 47099,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 133,
      "modified_text": "114 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "682d38446ea0d643bdde30c9",
      "name": "hxxps://eduroam[.]org",
      "description": "Surface analysis of another related thing - will update later",
      "modified": "2025-06-20T02:05:09.642000",
      "created": "2025-05-21T02:19:48.419000",
      "tags": [
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "virus",
        "ransomware",
        "static",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "platform",
        "ansi",
        "pcap",
        "pcap processing",
        "win64",
        "khtml",
        "gecko",
        "brand",
        "windows nt",
        "microsoft edge",
        "prefetch8 ansi",
        "cookie",
        "date",
        "mozilla",
        "accept",
        "window",
        "wind",
        "suspicious",
        "mozi",
        "bran",
        "dest",
        "hybrid",
        "comspec",
        "close",
        "click",
        "hosts",
        "general",
        "path",
        "model",
        "strings",
        "contact",
        "server",
        "redacted tech",
        "redacted admin",
        "host name",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "dnssec",
        "code",
        "javascript",
        "passive dns",
        "replication",
        "subdomains",
        "UAlberta",
        "Eduroam"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720",
        "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/overview",
        "https://www.filescan.io/uploads/682d2dfd0de036ed65ad6e33/reports/d54424e9-c5fc-4c6d-931e-7ee21360594a/geolocation",
        "https://www.hybrid-analysis.com/sample/f80bb3e3e2b1abe6be46374899ad0e112973c56a363eb2ce5b77d58a4d419720/682d2dcbc068830c1403398c",
        "https://www.virustotal.com/gui/domain/eduroam.org/details",
        "https://www.virustotal.com/gui/domain/eduroam.org/relations"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [
        "Telecommunications",
        "Education"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 288,
        "domain": 80,
        "email": 6,
        "FileHash-MD5": 15,
        "FileHash-SHA1": 13,
        "FileHash-SHA256": 96,
        "SSLCertFingerprint": 8,
        "hostname": 78,
        "CIDR": 2
      },
      "indicator_count": 586,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 130,
      "modified_text": "304 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6647908c09468f42bc1249f1",
      "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
      "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
      "modified": "2025-03-01T04:59:57.222000",
      "created": "2024-05-17T17:14:52.317000",
      "tags": [
        "false",
        "true",
        "visible",
        "application",
        "microsoft teams",
        "microsoft azure",
        "office",
        "service",
        "dynamics",
        "hidden",
        "android",
        "explorer",
        "write",
        "connector",
        "test",
        "sharepoint",
        "live",
        "meister",
        "tools",
        "desktop",
        "spark",
        "front",
        "enterprise",
        "designer",
        "atlas",
        "premium",
        "assistant",
        "allow",
        "azureadmyorg",
        "game",
        "verify",
        "microsoft power",
        "channelsurfcli",
        "mtd1",
        "file transfer",
        "magnus",
        "microsoft crm",
        "youth"
      ],
      "references": [
        "All - EnterpriseAppsList.csv",
        "AppRegistrationList.csv",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 7,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1703,
        "FileHash-SHA256": 90472,
        "URL": 99185,
        "domain": 82954,
        "hostname": 39041,
        "FileHash-SHA1": 1624,
        "email": 4658,
        "CVE": 12
      },
      "indicator_count": 319649,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "415 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "678dd7c763b29de06765fb52",
      "name": "hxxps://www[.]unitedconservative[.]ca/ - 01.19.25",
      "description": "Alberta UCP Compromise (i.e. potential evidence of active foreign interference).\n\nhttps://www.virustotal.com/graph/embed/g3fdc926b2208411e8b138e8bd7069b721b2586a3a1b3445aa4f70a932701ccbe?theme=dark",
      "modified": "2025-02-19T05:02:21.540000",
      "created": "2025-01-20T04:57:43.300000",
      "tags": [
        "pentester",
        "javascript",
        "completed",
        "risk",
        "load",
        "web application",
        "firewall",
        "google search",
        "ssl certificate",
        "http",
        "create account",
        "critical",
        "malware",
        "virus",
        "trojan",
        "ransomware",
        "static",
        "analysis",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "online",
        "submit",
        "sample",
        "download",
        "platform",
        "eci3",
        "eci4",
        "p1737345680749",
        "gaz1",
        "uaax86",
        "uab64",
        "sid1737345681",
        "sct1",
        "seg0",
        "nsi1",
        "url",
        "sandbox",
        "scanner",
        "reputation",
        "phishing",
        "hash",
        "miss",
        "eval",
        "first seen",
        "fastly",
        "gmt file",
        "linux x8664",
        "accept",
        "fingerprint",
        "loading",
        "path",
        "patch",
        "write",
        "vxstream",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please"
      ],
      "references": [
        "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
        "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
        "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
        "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe",
        "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 734,
        "domain": 486,
        "email": 8,
        "hostname": 346,
        "FileHash-SHA256": 1814,
        "FileHash-MD5": 363,
        "FileHash-SHA1": 361,
        "SSLCertFingerprint": 24
      },
      "indicator_count": 4136,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 129,
      "modified_text": "425 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65f3e394bcf868816a29c2dc",
      "name": "Google Pixel 7a Devices - Telus ISP devices 'protected' by Norton",
      "description": "Exactly as above. I mean, out of all of the phones these ones make phonecalls (most of the time can send & receive calls). Can be a little tricky. Incomplete - it be doing it's own thing downloading/uploading stuff and heading down the 'way all the other phones went' route.",
      "modified": "2024-11-02T15:05:54.240000",
      "created": "2024-03-15T05:58:44.839000",
      "tags": [
        "ISP",
        "Google",
        "Telus",
        "Norton",
        "Pixel"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/summary",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
        "https://www.virustotal.com/graph/embed/ga590434b8e274dc99fd39dd298c8c786abff51132c8d4646bb3fb3f1f4c3d100?theme=dark",
        "https://www.virustotal.com/graph/embed/g16457cd5ead246d99d2ecf37b965641b258cffddb8374ad194cdea194868d1ec?theme=dark",
        "https://www.virustotal.com/graph/embed/g2ef035cd31754a649909336c174aa141b9cca7e431994d12969e0d9d73a01b71?theme=dark",
        "https://www.virustotal.com/graph/embed/g1ea71614909243c1a291970fa39651a2d169deef25b7418fab2f0299221eb152?theme=dark",
        "https://www.virustotal.com/graph/embed/g20d14d97883a4127a500c45fcfb6e3e4961a30ef4bf74db7ab918bcbdb3f476b?theme=dark",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
        "",
        "https://www.filescan.io/uploads/66feb74d83903120b70c820f/reports/0a3a6c27-a872-4e0c-86a4-0fc690fb5ecd/details",
        "https://tip.neiki.dev/file/fb0b66efe3b780270db0693b6df42dd08068428b86fc1a579fe5117d4ae76e07/network",
        "http://www.hybrid-analysis.com/file-collection/66febb8ee0244a7af5014d61"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Telecommunications",
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1231,
        "FileHash-SHA1": 1215,
        "FileHash-SHA256": 99653,
        "URL": 158638,
        "domain": 49468,
        "hostname": 77233,
        "email": 6,
        "CIDR": 5450,
        "CVE": 55
      },
      "indicator_count": 392949,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 130,
      "modified_text": "533 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a48b6ea16eeb6b54dfad7c",
      "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears",
      "description": "",
      "modified": "2024-01-15T01:33:34.790000",
      "created": "2024-01-15T01:33:34.790000",
      "tags": [
        "cisco umbrella",
        "site",
        "alexa top",
        "emotet",
        "telefonica co",
        "million",
        "malware",
        "detection list",
        "blacklist",
        "alexa",
        "installcore",
        "heur",
        "cyber threat",
        "united",
        "phishing",
        "engineering",
        "phishing site",
        "team phishing",
        "spammer",
        "malicious site",
        "team",
        "download",
        "cobalt strike",
        "facebook",
        "artemis",
        "pony",
        "binder",
        "suppobox",
        "virut",
        "ramnit",
        "dropper",
        "formbook",
        "azorult",
        "simda",
        "downloader",
        "service",
        "bank",
        "zbot",
        "trojanspy",
        "heodo",
        "hostname",
        "hostnames",
        "whois record",
        "kgs0",
        "kls0",
        "apple ios",
        "tsara brashears",
        "ssl certificate",
        "elf collection",
        "cyberstalking",
        "spyware",
        "hackers",
        "installer",
        "open",
        "banker",
        "keylogger",
        "malicious",
        "hacktool",
        "core",
        "noname057",
        "generic malware",
        "safe site",
        "malware site",
        "iframe",
        "riskware",
        "exploit",
        "fakealert",
        "unsafe",
        "acint",
        "win64",
        "nircmd",
        "agent",
        "opencandy",
        "conduit",
        "swrort",
        "crack",
        "installpack",
        "xtrat",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "unruy",
        "filetour",
        "floxif",
        "cleaner",
        "patcher",
        "adload",
        "presenoker",
        "wacatac",
        "fusioncore",
        "genkryptik",
        "webtoolbar",
        "maltiverse",
        "smokeloader",
        "download json",
        "urls",
        "blacklist http",
        "kyriazhs1975",
        "vidar",
        "strike",
        "china cobalt",
        "meterpreter",
        "nanocore rat",
        "njrat",
        "redline stealer",
        "stealer",
        "nymaim",
        "mirai",
        "ghost rat",
        "runescape",
        "bradesco",
        "msil",
        "bladabindi",
        "orkut",
        "cutwail",
        "bandoo",
        "matsnu",
        "inmortal",
        "domains",
        "redline",
        "control server",
        "services",
        "generic",
        "br",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "squirrelwaffle",
        "soc http",
        "soc https",
        "back",
        "download csv",
        "json sample",
        "injector",
        "malicious url",
        "downldr",
        "covid19 scam",
        "historical ssl",
        "referrer",
        "contacted",
        "whois whois",
        "contacted urls",
        "whois sslcert",
        "threat roundup",
        "copy",
        "august",
        "execution",
        "ransomware",
        "gopher",
        "remcos",
        "attack",
        "radar ineractive",
        "paypal",
        "covid19",
        "phishing chase",
        "phishing google",
        "tracker malware",
        "chase personal",
        "banking",
        "javascript",
        "please",
        "cnc server",
        "tracker",
        "cnc feodo",
        "phishtank",
        "threats et",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "file",
        "ascii text",
        "indicator",
        "windows nt",
        "jpeg image",
        "appdata",
        "jfif standard",
        "script",
        "show",
        "date",
        "span",
        "unknown",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "path",
        "http header",
        "tcp traffic",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "accept",
        "adware",
        "ip address",
        "hsbc",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "iobit",
        "trojanx",
        "webshell",
        "systweak",
        "behav",
        "tiggre",
        "runtime process",
        "sha256",
        "sha1",
        "mark brian sabey",
        "brian sabey",
        "sabey",
        "apple",
        "114.114.114.114",
        "attorney",
        "law",
        "spammer",
        "fraud service",
        "hallrender",
        "malvertizing",
        "cybercrime",
        "social engineering",
        "malware hosting",
        "cyber threat",
        "iphone unlocker",
        "malicious",
        "attacker",
        "tulach",
        "tulach.cc",
        "adult content",
        "child pornographer",
        "sabey data centers",
        "hall render denver",
        "monitoring",
        "stalker",
        "dev",
        "developer",
        "cyber harassment",
        "defacement",
        "death threats",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "rms",
        "sneaky server",
        "replacement",
        "unauthorized",
        "steam route",
        "tool",
        "probe",
        "safebae.org",
        "safebae",
        "daisy",
        "daisy coleman",
        "benjamin",
        "colorado",
        "missouri",
        "telefonica",
        "boost mobile",
        "blackievirus.com",
        "TrojanX",
        "metro t-mobile",
        "t-mobile",
        "mile high media",
        "CNC",
        "C2",
        "malware host",
        "yixun"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
        "https://www.hallrender.com/attorney/brian-sabey",
        "safebae.org",
        "poemhunter.com",
        "http://www.hallrender.com/resources/blog/",
        "http://benjamin.xww.de/",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Hybrid Analysis",
        "wTools",
        "Research"
      ],
      "public": 1,
      "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "BR",
          "display_name": "BR",
          "target": null
        },
        {
          "id": "Radar Ineractive",
          "display_name": "Radar Ineractive",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "RMS",
          "display_name": "RMS",
          "target": null
        },
        {
          "id": "Feodo Tracker",
          "display_name": "Feodo Tracker",
          "target": null
        },
        {
          "id": "Wacatac",
          "display_name": "Wacatac",
          "target": null
        },
        {
          "id": "Zpevdo",
          "display_name": "Zpevdo",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "xRAT",
          "display_name": "xRAT",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "noname057",
          "display_name": "noname057",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "DarkSide .Beware",
          "display_name": "DarkSide .Beware",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
          "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Systweak",
          "display_name": "Systweak",
          "target": null
        },
        {
          "id": "Occamy",
          "display_name": "Occamy",
          "target": null
        },
        {
          "id": "Tiggre",
          "display_name": "Tiggre",
          "target": null
        },
        {
          "id": "IObit",
          "display_name": "IObit",
          "target": null
        },
        {
          "id": "Sality",
          "display_name": "Sality",
          "target": null
        },
        {
          "id": "FORMBOOK",
          "display_name": "FORMBOOK",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": "6590f9b6b1fe0330c655c25f",
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1643,
        "hostname": 1438,
        "CVE": 30,
        "FileHash-MD5": 2853,
        "FileHash-SHA1": 1584,
        "FileHash-SHA256": 3001,
        "URL": 2904,
        "email": 1
      },
      "indicator_count": 13454,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "826 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6590f9b6b1fe0330c655c25f",
      "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears ",
      "description": "",
      "modified": "2023-12-31T05:18:46.519000",
      "created": "2023-12-31T05:18:46.519000",
      "tags": [
        "cisco umbrella",
        "site",
        "alexa top",
        "emotet",
        "telefonica co",
        "million",
        "malware",
        "detection list",
        "blacklist",
        "alexa",
        "installcore",
        "heur",
        "cyber threat",
        "united",
        "phishing",
        "engineering",
        "phishing site",
        "team phishing",
        "spammer",
        "malicious site",
        "team",
        "download",
        "cobalt strike",
        "facebook",
        "artemis",
        "pony",
        "binder",
        "suppobox",
        "virut",
        "ramnit",
        "dropper",
        "formbook",
        "azorult",
        "simda",
        "downloader",
        "service",
        "bank",
        "zbot",
        "trojanspy",
        "heodo",
        "hostname",
        "hostnames",
        "whois record",
        "kgs0",
        "kls0",
        "apple ios",
        "tsara brashears",
        "ssl certificate",
        "elf collection",
        "cyberstalking",
        "spyware",
        "hackers",
        "installer",
        "open",
        "banker",
        "keylogger",
        "malicious",
        "hacktool",
        "core",
        "noname057",
        "generic malware",
        "safe site",
        "malware site",
        "iframe",
        "riskware",
        "exploit",
        "fakealert",
        "unsafe",
        "acint",
        "win64",
        "nircmd",
        "agent",
        "opencandy",
        "conduit",
        "swrort",
        "crack",
        "installpack",
        "xtrat",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "unruy",
        "filetour",
        "floxif",
        "cleaner",
        "patcher",
        "adload",
        "presenoker",
        "wacatac",
        "fusioncore",
        "genkryptik",
        "webtoolbar",
        "maltiverse",
        "smokeloader",
        "download json",
        "urls",
        "blacklist http",
        "kyriazhs1975",
        "vidar",
        "strike",
        "china cobalt",
        "meterpreter",
        "nanocore rat",
        "njrat",
        "redline stealer",
        "stealer",
        "nymaim",
        "mirai",
        "ghost rat",
        "runescape",
        "bradesco",
        "msil",
        "bladabindi",
        "orkut",
        "cutwail",
        "bandoo",
        "matsnu",
        "inmortal",
        "domains",
        "redline",
        "control server",
        "services",
        "generic",
        "br",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "squirrelwaffle",
        "soc http",
        "soc https",
        "back",
        "download csv",
        "json sample",
        "injector",
        "malicious url",
        "downldr",
        "covid19 scam",
        "historical ssl",
        "referrer",
        "contacted",
        "whois whois",
        "contacted urls",
        "whois sslcert",
        "threat roundup",
        "copy",
        "august",
        "execution",
        "ransomware",
        "gopher",
        "remcos",
        "attack",
        "radar ineractive",
        "paypal",
        "covid19",
        "phishing chase",
        "phishing google",
        "tracker malware",
        "chase personal",
        "banking",
        "javascript",
        "please",
        "cnc server",
        "tracker",
        "cnc feodo",
        "phishtank",
        "threats et",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "file",
        "ascii text",
        "indicator",
        "windows nt",
        "jpeg image",
        "appdata",
        "jfif standard",
        "script",
        "show",
        "date",
        "span",
        "unknown",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "path",
        "http header",
        "tcp traffic",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "accept",
        "adware",
        "ip address",
        "hsbc",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "iobit",
        "trojanx",
        "webshell",
        "systweak",
        "behav",
        "tiggre",
        "runtime process",
        "sha256",
        "sha1",
        "mark brian sabey",
        "brian sabey",
        "sabey",
        "apple",
        "114.114.114.114",
        "attorney",
        "law",
        "spammer",
        "fraud service",
        "hallrender",
        "malvertizing",
        "cybercrime",
        "social engineering",
        "malware hosting",
        "cyber threat",
        "iphone unlocker",
        "malicious",
        "attacker",
        "tulach",
        "tulach.cc",
        "adult content",
        "child pornographer",
        "sabey data centers",
        "hall render denver",
        "monitoring",
        "stalker",
        "dev",
        "developer",
        "cyber harassment",
        "defacement",
        "death threats",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "rms",
        "sneaky server",
        "replacement",
        "unauthorized",
        "steam route",
        "tool",
        "probe",
        "safebae.org",
        "safebae",
        "daisy",
        "daisy coleman",
        "benjamin",
        "colorado",
        "missouri",
        "telefonica",
        "boost mobile",
        "blackievirus.com",
        "TrojanX",
        "metro t-mobile",
        "t-mobile",
        "mile high media",
        "CNC",
        "C2",
        "malware host",
        "yixun"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
        "https://www.hallrender.com/attorney/brian-sabey",
        "safebae.org",
        "poemhunter.com",
        "http://www.hallrender.com/resources/blog/",
        "http://benjamin.xww.de/",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Hybrid Analysis",
        "wTools",
        "Research"
      ],
      "public": 1,
      "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "BR",
          "display_name": "BR",
          "target": null
        },
        {
          "id": "Radar Ineractive",
          "display_name": "Radar Ineractive",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "RMS",
          "display_name": "RMS",
          "target": null
        },
        {
          "id": "Feodo Tracker",
          "display_name": "Feodo Tracker",
          "target": null
        },
        {
          "id": "Wacatac",
          "display_name": "Wacatac",
          "target": null
        },
        {
          "id": "Zpevdo",
          "display_name": "Zpevdo",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "OpenCandy",
          "display_name": "OpenCandy",
          "target": null
        },
        {
          "id": "xRAT",
          "display_name": "xRAT",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "noname057",
          "display_name": "noname057",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "DarkSide .Beware",
          "display_name": "DarkSide .Beware",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
          "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Systweak",
          "display_name": "Systweak",
          "target": null
        },
        {
          "id": "Occamy",
          "display_name": "Occamy",
          "target": null
        },
        {
          "id": "Tiggre",
          "display_name": "Tiggre",
          "target": null
        },
        {
          "id": "IObit",
          "display_name": "IObit",
          "target": null
        },
        {
          "id": "Sality",
          "display_name": "Sality",
          "target": null
        },
        {
          "id": "FORMBOOK",
          "display_name": "FORMBOOK",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Yixun",
          "display_name": "Yixun",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": "658741502e029e25c7152cc0",
      "export_count": 45,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1643,
        "hostname": 1438,
        "CVE": 30,
        "FileHash-MD5": 2853,
        "FileHash-SHA1": 1584,
        "FileHash-SHA256": 3001,
        "URL": 2904,
        "email": 1
      },
      "indicator_count": 13454,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "841 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://animesharke.cf",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://animesharke.cf",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776681776.2870617
}