{
  "type": "URL",
  "indicator": "https://appdev.sulfah.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://appdev.sulfah.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4162488743,
      "indicator": "https://appdev.sulfah.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "696ac416596cd89cf76bce55",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:04:53.997000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac4327b5bc2e8be34f78a",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:22.323000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac438a696c993b672106d",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:28.261000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69589dd49ec0010e69444d66",
          "name": "AgentTesla affecting a video game platform currently downed",
          "description": "DeadByDayLight.com is being crushed by malware attacks. I only researched one of the Trojans found. AgentTesla. I\u2019m definitely not a gamer, found it interesting the peripheral whilst researching. Research led link as it relates to related Pulse/a.",
          "modified": "2026-02-02T03:02:34.652000",
          "created": "2026-01-03T04:40:52.240000",
          "tags": [
            "aaaa",
            "united",
            "present sep",
            "present aug",
            "present jun",
            "present jan",
            "ip address",
            "name servers",
            "iocs",
            "data upload",
            "extraction",
            "review iocs",
            "ada indicator",
            "find suggested",
            "type a",
            "passive dns",
            "urls",
            "domain",
            "address",
            "asn as16509",
            "trojandropper",
            "subid",
            "title error",
            "ipv4",
            "twitter",
            "win32",
            "servers",
            "hostname add",
            "url analysis",
            "ms windows",
            "pe32",
            "intel",
            "memcommit",
            "caption",
            "f im",
            "read c",
            "mozilla",
            "service",
            "write",
            "persistence",
            "execution",
            "malware",
            "next",
            "united states",
            "yara detections",
            "alerts",
            "analysis date",
            "suspicious ua",
            "nsisdl",
            "less see",
            "all ip",
            "contacted",
            "tech broism",
            "palantir"
          ],
          "references": [
            "https://deadbydaylight.com",
            "Win.Trojan.Generic-9884244-0 ,  ALF:Trojan:MSIL/AgentTesla.KM",
            "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla)) Nullsoft Mozilla UA (NSISDL)",
            "Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp antivm_generic_services persistence_autorun creates_largekey",
            "Alerts: creates_service dumped_buffer network_cnc_http network_http allocates_rwx",
            "Alerts: antivm_disk_size infostealer_browser creates_exe creates_shortcut",
            "Alerts: queries_programs uses_windows_utilities antivm_queries_computername",
            "Alerts: exe_appdata has_wmi antivm_network_adapters privilege_luid_check",
            "IP\u2019s Contacted  34.233.61.169  54.192.76.30  54.230.125.59",
            "Domains Contacted proxel.bytefence.com logs.bytefence.com",
            "Domains related/not pulsed: video-lal.com/videos/tsara-brashears-dead-by-daylight.html",
            "gossamer-containers.washington.palantircloud.com \u2022",
            "sandboxes-ranunculus.palantirfedstart.com \u2022  eureka-bah-usgc-1.palantirfedstart.com \u2022",
            "http://2.palantirfedstart.com/ \u2022 http://authorium-docs-stg.palantirfedstart.com",
            "https://sandboxes-ranunculus.palantirfedstart.com/t",
            "http://lsauth-vault.palantirfedstart.com  \u2022 http://mugwort-container-registry.palantirfedstart.com/",
            "https://containers-specterops-mckinley.palantirfedstart.com/",
            "https://mugwort-container-registry.palantirfedstart.com/ \u2022 https://ohrid-usgc-1.palantirfedstart.com",
            "https://authorium-docs-stg.palantirfedstart.com \u2022 https://chelan-containers.palantirfedstart.com",
            "https://containers-manuka-usgc-1.palantirfedstart.com \u2022 rizkly.palantirfedstart.com",
            "palantirfedstart.com \u2022 rizkly.palantirfedstart.com \u2022",
            "https://kalpak.palantirfedstart.com/ \u2022 https://lsauth-vault.palantirfedstart.com/",
            "primer-delta-endpoints-staging.palantirfedstart.com",
            "http://containers-manuka-usgc-1.palantirfedstart.com \u2022http://kalpak.palantirfedstart.com",
            "http://ohrid-usgc-1.palantirfedstart.com \u2022 http://sandboxes-ranunculus.palantirfedstart.com",
            "http://sundog-ge-traces.palantirfedstart.com \u2022 https://2.palantirfedstart.com/u"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Trojan.Generic-9884244-0 ,",
              "display_name": "Win.Trojan.Generic-9884244-0 ,",
              "target": null
            },
            {
              "id": "alf:Trojan:MSIL/AgentTesla.KM",
              "display_name": "alf:Trojan:MSIL/AgentTesla.KM",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4342,
            "domain": 767,
            "hostname": 1456,
            "FileHash-SHA256": 233,
            "FileHash-MD5": 99,
            "FileHash-SHA1": 63,
            "email": 3,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 6964,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "76 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f5674439d297728312967",
          "name": "BeenVerified.com | Malicious Information Doman |",
          "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:29:40.025000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f5675e3f12fa3229bdcb3",
          "name": "BeenVerified.com | Malicious Information Doman |",
          "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:29:41.963000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f57720ddcc1a02d19a78f",
          "name": "GameHack Malware | BeenVerified.com | Information Doman |",
          "description": "",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:33:54.304000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "693f5674439d297728312967",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://lsauth-vault.palantirfedstart.com  \u2022 http://mugwort-container-registry.palantirfedstart.com/",
        "Win.Trojan.Generic-9884244-0 ,  ALF:Trojan:MSIL/AgentTesla.KM",
        "Domains Contacted proxel.bytefence.com logs.bytefence.com",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "IP\u2019s Contacted  34.233.61.169  54.192.76.30  54.230.125.59",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Domains related/not pulsed: video-lal.com/videos/tsara-brashears-dead-by-daylight.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "http://2.palantirfedstart.com/ \u2022 http://authorium-docs-stg.palantirfedstart.com",
        "Yara Detections: Nullsoft_NSIS",
        "https://sandboxes-ranunculus.palantirfedstart.com/t",
        "Alerts: antivm_disk_size infostealer_browser creates_exe creates_shortcut",
        "pegasuspartners.followupboss.com",
        "https://mugwort-container-registry.palantirfedstart.com/ \u2022 https://ohrid-usgc-1.palantirfedstart.com",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "https://containers-manuka-usgc-1.palantirfedstart.com \u2022 rizkly.palantirfedstart.com",
        "Alerts: creates_service dumped_buffer network_cnc_http network_http allocates_rwx",
        "https://deadbydaylight.com",
        "Alerts: queries_programs uses_windows_utilities antivm_queries_computername",
        "https://authorium-docs-stg.palantirfedstart.com \u2022 https://chelan-containers.palantirfedstart.com",
        "http://ohrid-usgc-1.palantirfedstart.com \u2022 http://sandboxes-ranunculus.palantirfedstart.com",
        "Alerts: exe_appdata has_wmi antivm_network_adapters privilege_luid_check",
        "palantirfedstart.com \u2022 rizkly.palantirfedstart.com \u2022",
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://kalpak.palantirfedstart.com/ \u2022 https://lsauth-vault.palantirfedstart.com/",
        "Alerts: network_icmp antivm_generic_services persistence_autorun creates_largekey",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht",
        "gossamer-containers.washington.palantircloud.com \u2022",
        "http://containers-manuka-usgc-1.palantirfedstart.com \u2022http://kalpak.palantirfedstart.com",
        "https://containers-specterops-mckinley.palantirfedstart.com/",
        "http://sundog-ge-traces.palantirfedstart.com \u2022 https://2.palantirfedstart.com/u",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "search.roi.ros.gov.uk",
        "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla)) Nullsoft Mozilla UA (NSISDL)",
        "primer-delta-endpoints-staging.palantirfedstart.com",
        "sandboxes-ranunculus.palantirfedstart.com \u2022  eureka-bah-usgc-1.palantirfedstart.com \u2022"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.trojan.generic-9884244-0 ,",
            "Pegasus",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Alf:trojan:msil/agenttesla.km",
            "Other malware"
          ],
          "industries": [],
          "unique_indicators": 34945
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/sulfah.com",
    "whois": "http://whois.domaintools.com/sulfah.com",
    "domain": "sulfah.com",
    "hostname": "appdev.sulfah.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "696ac416596cd89cf76bce55",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:04:53.997000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac4327b5bc2e8be34f78a",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:22.323000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac438a696c993b672106d",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:28.261000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69589dd49ec0010e69444d66",
      "name": "AgentTesla affecting a video game platform currently downed",
      "description": "DeadByDayLight.com is being crushed by malware attacks. I only researched one of the Trojans found. AgentTesla. I\u2019m definitely not a gamer, found it interesting the peripheral whilst researching. Research led link as it relates to related Pulse/a.",
      "modified": "2026-02-02T03:02:34.652000",
      "created": "2026-01-03T04:40:52.240000",
      "tags": [
        "aaaa",
        "united",
        "present sep",
        "present aug",
        "present jun",
        "present jan",
        "ip address",
        "name servers",
        "iocs",
        "data upload",
        "extraction",
        "review iocs",
        "ada indicator",
        "find suggested",
        "type a",
        "passive dns",
        "urls",
        "domain",
        "address",
        "asn as16509",
        "trojandropper",
        "subid",
        "title error",
        "ipv4",
        "twitter",
        "win32",
        "servers",
        "hostname add",
        "url analysis",
        "ms windows",
        "pe32",
        "intel",
        "memcommit",
        "caption",
        "f im",
        "read c",
        "mozilla",
        "service",
        "write",
        "persistence",
        "execution",
        "malware",
        "next",
        "united states",
        "yara detections",
        "alerts",
        "analysis date",
        "suspicious ua",
        "nsisdl",
        "less see",
        "all ip",
        "contacted",
        "tech broism",
        "palantir"
      ],
      "references": [
        "https://deadbydaylight.com",
        "Win.Trojan.Generic-9884244-0 ,  ALF:Trojan:MSIL/AgentTesla.KM",
        "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla)) Nullsoft Mozilla UA (NSISDL)",
        "Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp antivm_generic_services persistence_autorun creates_largekey",
        "Alerts: creates_service dumped_buffer network_cnc_http network_http allocates_rwx",
        "Alerts: antivm_disk_size infostealer_browser creates_exe creates_shortcut",
        "Alerts: queries_programs uses_windows_utilities antivm_queries_computername",
        "Alerts: exe_appdata has_wmi antivm_network_adapters privilege_luid_check",
        "IP\u2019s Contacted  34.233.61.169  54.192.76.30  54.230.125.59",
        "Domains Contacted proxel.bytefence.com logs.bytefence.com",
        "Domains related/not pulsed: video-lal.com/videos/tsara-brashears-dead-by-daylight.html",
        "gossamer-containers.washington.palantircloud.com \u2022",
        "sandboxes-ranunculus.palantirfedstart.com \u2022  eureka-bah-usgc-1.palantirfedstart.com \u2022",
        "http://2.palantirfedstart.com/ \u2022 http://authorium-docs-stg.palantirfedstart.com",
        "https://sandboxes-ranunculus.palantirfedstart.com/t",
        "http://lsauth-vault.palantirfedstart.com  \u2022 http://mugwort-container-registry.palantirfedstart.com/",
        "https://containers-specterops-mckinley.palantirfedstart.com/",
        "https://mugwort-container-registry.palantirfedstart.com/ \u2022 https://ohrid-usgc-1.palantirfedstart.com",
        "https://authorium-docs-stg.palantirfedstart.com \u2022 https://chelan-containers.palantirfedstart.com",
        "https://containers-manuka-usgc-1.palantirfedstart.com \u2022 rizkly.palantirfedstart.com",
        "palantirfedstart.com \u2022 rizkly.palantirfedstart.com \u2022",
        "https://kalpak.palantirfedstart.com/ \u2022 https://lsauth-vault.palantirfedstart.com/",
        "primer-delta-endpoints-staging.palantirfedstart.com",
        "http://containers-manuka-usgc-1.palantirfedstart.com \u2022http://kalpak.palantirfedstart.com",
        "http://ohrid-usgc-1.palantirfedstart.com \u2022 http://sandboxes-ranunculus.palantirfedstart.com",
        "http://sundog-ge-traces.palantirfedstart.com \u2022 https://2.palantirfedstart.com/u"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Trojan.Generic-9884244-0 ,",
          "display_name": "Win.Trojan.Generic-9884244-0 ,",
          "target": null
        },
        {
          "id": "alf:Trojan:MSIL/AgentTesla.KM",
          "display_name": "alf:Trojan:MSIL/AgentTesla.KM",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4342,
        "domain": 767,
        "hostname": 1456,
        "FileHash-SHA256": 233,
        "FileHash-MD5": 99,
        "FileHash-SHA1": 63,
        "email": 3,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 6964,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "76 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f5674439d297728312967",
      "name": "BeenVerified.com | Malicious Information Doman |",
      "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:29:40.025000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f5675e3f12fa3229bdcb3",
      "name": "BeenVerified.com | Malicious Information Doman |",
      "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:29:41.963000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f57720ddcc1a02d19a78f",
      "name": "GameHack Malware | BeenVerified.com | Information Doman |",
      "description": "",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:33:54.304000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "693f5674439d297728312967",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://appdev.sulfah.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://appdev.sulfah.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631439.5415235
}