{
  "type": "URL",
  "indicator": "https://attack.mitre.org/software/S0194",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://attack.mitre.org/software/S0194",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "whitelist",
        "message": "Whitelisted domain mitre.org",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain mitre.org",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 4053912492,
      "indicator": "https://attack.mitre.org/software/S0194",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "67eb87f8beff23dfe3508000",
          "name": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device",
          "description": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device (She's had it)\nResults for matches uploaded to VT\nJust tossed results into this pulse so - sloppy.",
          "modified": "2025-04-01T07:52:30.117000",
          "created": "2025-04-01T06:30:16.309000",
          "tags": [
            "fri mar",
            "filename ioc",
            "reasonscount",
            "sigtype1",
            "indicator type",
            "log entry",
            "entry",
            "exists1",
            "matched1",
            "exploit code",
            "score",
            "rooter",
            "warp",
            "cobaltstrike",
            "luckycat",
            "obfus",
            "code",
            "surtr",
            "9999",
            "powersploit",
            "bypass",
            "proftpd",
            "mimikatz",
            "info"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs",
            "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            }
          ],
          "industries": [
            "Technology",
            "Healthcare",
            "Education",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 345,
            "FileHash-MD5": 111,
            "FileHash-SHA1": 174,
            "FileHash-SHA256": 131,
            "URL": 499,
            "domain": 38,
            "hostname": 47
          },
          "indicator_count": 1345,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "383 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary",
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [
            "Technology",
            "Government",
            "Healthcare",
            "Education"
          ],
          "unique_indicators": 1348
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/mitre.org",
    "whois": "http://whois.domaintools.com/mitre.org",
    "domain": "mitre.org",
    "hostname": "attack.mitre.org"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "67eb87f8beff23dfe3508000",
      "name": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device",
      "description": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device (She's had it)\nResults for matches uploaded to VT\nJust tossed results into this pulse so - sloppy.",
      "modified": "2025-04-01T07:52:30.117000",
      "created": "2025-04-01T06:30:16.309000",
      "tags": [
        "fri mar",
        "filename ioc",
        "reasonscount",
        "sigtype1",
        "indicator type",
        "log entry",
        "entry",
        "exists1",
        "matched1",
        "exploit code",
        "score",
        "rooter",
        "warp",
        "cobaltstrike",
        "luckycat",
        "obfus",
        "code",
        "surtr",
        "9999",
        "powersploit",
        "bypass",
        "proftpd",
        "mimikatz",
        "info"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs",
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1569",
          "name": "System Services",
          "display_name": "T1569 - System Services"
        }
      ],
      "industries": [
        "Technology",
        "Healthcare",
        "Education",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 345,
        "FileHash-MD5": 111,
        "FileHash-SHA1": 174,
        "FileHash-SHA256": 131,
        "URL": 499,
        "domain": 38,
        "hostname": 47
      },
      "indicator_count": 1345,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "383 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://attack.mitre.org/software/S0194",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://attack.mitre.org/software/S0194",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622594.7468827
}