{
  "type": "URL",
  "indicator": "https://attack.mitre.org/techniques/T1112",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://attack.mitre.org/techniques/T1112",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "whitelist",
        "message": "Whitelisted domain mitre.org",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain mitre.org",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 3115182478,
      "indicator": "https://attack.mitre.org/techniques/T1112",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "6935d7d4979c94d296e4b033",
          "name": "New Exploits | CVE\u2019s | 12.07.2025",
          "description": "",
          "modified": "2026-01-06T00:03:32.099000",
          "created": "2025-12-07T19:39:00.258000",
          "tags": [],
          "references": [
            "Phishing: https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav/",
            "https://www.redpacketsecurity.com/cve-alert-cve-2025-59230-microsoft-windows-10-version-1809/",
            "https://www.redpacketsecurity.com/cve_alert_cve-2024-12847/",
            "https://www.redpacketsecurity.com/cve_alert_cve-2025-4135/",
            "https://www.redpacketsecurity.com/cve_alert_cve-2025-4140/",
            "https://www.redpacketsecurity.com/cve_alert_cve-2025-4142/",
            "https://www.redpacketsecurity.com/cve_alert_cve-2025-45492/",
            "https://www.redpacketsecurity.com/firefox-0day-cve-2015-4495/"
          ],
          "public": 1,
          "adversary": "Coinbase Cartel",
          "targeted_countries": [
            "United States of America",
            "Bangladesh",
            "Sweden",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "Exploit:Linux/CVE-2017-17215",
              "display_name": "Exploit:Linux/CVE-2017-17215",
              "target": "/malware/Exploit:Linux/CVE-2017-17215"
            },
            {
              "id": "Exploit:JS/CVE-2014-0322",
              "display_name": "Exploit:JS/CVE-2014-0322",
              "target": "/malware/Exploit:JS/CVE-2014-0322"
            },
            {
              "id": "CVE-2015-4495",
              "display_name": "CVE-2015-4495",
              "target": null
            },
            {
              "id": "CVE-2024-12847",
              "display_name": "CVE-2024-12847",
              "target": null
            },
            {
              "id": "CVE-2025-11727",
              "display_name": "CVE-2025-11727",
              "target": null
            },
            {
              "id": "CVE-2025-4135",
              "display_name": "CVE-2025-4135",
              "target": null
            },
            {
              "id": "CVE-2025-4140",
              "display_name": "CVE-2025-4140",
              "target": null
            },
            {
              "id": "CVE-2025-4142",
              "display_name": "CVE-2025-4142",
              "target": null
            },
            {
              "id": "CVE-2025-45492",
              "display_name": "CVE-2025-45492",
              "target": null
            },
            {
              "id": "CVE-2025-59230",
              "display_name": "CVE-2025-59230",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1482",
              "name": "Domain Trust Discovery",
              "display_name": "T1482 - Domain Trust Discovery"
            }
          ],
          "industries": [
            "Education"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 523,
            "CVE": 10,
            "domain": 44,
            "hostname": 149,
            "FileHash-MD5": 30,
            "FileHash-SHA1": 21,
            "FileHash-SHA256": 133
          },
          "indicator_count": 910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "103 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "685ef2fc03ce0420e15042ed",
          "name": "ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe",
          "description": "MD5  84c82835a5d21bbcf75a61706d8ab549\nHere is the full text of the code-crunching tool, which is used by \nMicrosoft to store data on the operating system, as well as the text and characters on its built-up.\nhttps://www.virustotal.com/gui/file/15e6e251556675ddf1c524a6668d3ac82a84532f9c99a1f2f70d37f03128682b/details",
          "modified": "2025-10-01T00:01:22.860000",
          "created": "2025-06-27T19:37:32.636000",
          "tags": [
            "result",
            "memcpy",
            "function405e27",
            "memcpy8",
            "v43 v45",
            "getprocaddress",
            "null",
            "closehandle",
            "memset",
            "result2",
            "false",
            "copy",
            "docsapiv2",
            "feed faq"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/file/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 23,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 24,
            "domain": 2,
            "CVE": 3,
            "hostname": 1
          },
          "indicator_count": 64,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 125,
          "modified_text": "200 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4140/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4142/",
        "https://www.redpacketsecurity.com/firefox-0day-cve-2015-4495/",
        "Phishing: https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav/",
        "https://otx.alienvault.com/indicator/file/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa/",
        "https://www.redpacketsecurity.com/cve-alert-cve-2025-59230-microsoft-windows-10-version-1809/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4135/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-45492/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2024-12847/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Coinbase Cartel"
          ],
          "malware_families": [
            "Cve-2025-4142",
            "Cve-2025-59230",
            "Exploit:js/cve-2014-0322",
            "Cve-2025-45492",
            "Exploit:linux/cve-2017-17215",
            "Cve-2025-4140",
            "Cve-2024-12847",
            "Cve-2015-4495",
            "Cve-2025-4135",
            "Cve-2025-11727"
          ],
          "industries": [
            "Education"
          ],
          "unique_indicators": 954
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/mitre.org",
    "whois": "http://whois.domaintools.com/mitre.org",
    "domain": "mitre.org",
    "hostname": "attack.mitre.org"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "6935d7d4979c94d296e4b033",
      "name": "New Exploits | CVE\u2019s | 12.07.2025",
      "description": "",
      "modified": "2026-01-06T00:03:32.099000",
      "created": "2025-12-07T19:39:00.258000",
      "tags": [],
      "references": [
        "Phishing: https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav/",
        "https://www.redpacketsecurity.com/cve-alert-cve-2025-59230-microsoft-windows-10-version-1809/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2024-12847/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4135/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4140/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-4142/",
        "https://www.redpacketsecurity.com/cve_alert_cve-2025-45492/",
        "https://www.redpacketsecurity.com/firefox-0day-cve-2015-4495/"
      ],
      "public": 1,
      "adversary": "Coinbase Cartel",
      "targeted_countries": [
        "United States of America",
        "Bangladesh",
        "Sweden",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "Exploit:Linux/CVE-2017-17215",
          "display_name": "Exploit:Linux/CVE-2017-17215",
          "target": "/malware/Exploit:Linux/CVE-2017-17215"
        },
        {
          "id": "Exploit:JS/CVE-2014-0322",
          "display_name": "Exploit:JS/CVE-2014-0322",
          "target": "/malware/Exploit:JS/CVE-2014-0322"
        },
        {
          "id": "CVE-2015-4495",
          "display_name": "CVE-2015-4495",
          "target": null
        },
        {
          "id": "CVE-2024-12847",
          "display_name": "CVE-2024-12847",
          "target": null
        },
        {
          "id": "CVE-2025-11727",
          "display_name": "CVE-2025-11727",
          "target": null
        },
        {
          "id": "CVE-2025-4135",
          "display_name": "CVE-2025-4135",
          "target": null
        },
        {
          "id": "CVE-2025-4140",
          "display_name": "CVE-2025-4140",
          "target": null
        },
        {
          "id": "CVE-2025-4142",
          "display_name": "CVE-2025-4142",
          "target": null
        },
        {
          "id": "CVE-2025-45492",
          "display_name": "CVE-2025-45492",
          "target": null
        },
        {
          "id": "CVE-2025-59230",
          "display_name": "CVE-2025-59230",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1482",
          "name": "Domain Trust Discovery",
          "display_name": "T1482 - Domain Trust Discovery"
        }
      ],
      "industries": [
        "Education"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 523,
        "CVE": 10,
        "domain": 44,
        "hostname": 149,
        "FileHash-MD5": 30,
        "FileHash-SHA1": 21,
        "FileHash-SHA256": 133
      },
      "indicator_count": 910,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "103 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "685ef2fc03ce0420e15042ed",
      "name": "ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe",
      "description": "MD5  84c82835a5d21bbcf75a61706d8ab549\nHere is the full text of the code-crunching tool, which is used by \nMicrosoft to store data on the operating system, as well as the text and characters on its built-up.\nhttps://www.virustotal.com/gui/file/15e6e251556675ddf1c524a6668d3ac82a84532f9c99a1f2f70d37f03128682b/details",
      "modified": "2025-10-01T00:01:22.860000",
      "created": "2025-06-27T19:37:32.636000",
      "tags": [
        "result",
        "memcpy",
        "function405e27",
        "memcpy8",
        "v43 v45",
        "getprocaddress",
        "null",
        "closehandle",
        "memset",
        "result2",
        "false",
        "copy",
        "docsapiv2",
        "feed faq"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 23,
        "FileHash-MD5": 9,
        "FileHash-SHA1": 2,
        "FileHash-SHA256": 24,
        "domain": 2,
        "CVE": 3,
        "hostname": 1
      },
      "indicator_count": 64,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 125,
      "modified_text": "200 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://attack.mitre.org/techniques/T1112",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://attack.mitre.org/techniques/T1112",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622685.4773033
}