{
  "type": "URL",
  "indicator": "https://auth.cranberry.testing.maxfehlinger.de",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://auth.cranberry.testing.maxfehlinger.de",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3893188379,
      "indicator": "https://auth.cranberry.testing.maxfehlinger.de",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "6888a85aa32aab22f638d0e6",
          "name": "Autodesk issue in CrowdStrike prior to outage | [by scoreblue]",
          "description": "",
          "modified": "2025-07-29T10:54:18.501000",
          "created": "2025-07-29T10:54:18.501000",
          "tags": [
            "healthy check",
            "ssl bypass",
            "domain tracker",
            "privacy badger",
            "startpage",
            "w11 pc",
            "pass",
            "iocs",
            "all scoreblue",
            "pdf report",
            "pcap",
            "stix",
            "avast avg",
            "no expiration",
            "status",
            "name servers",
            "moved",
            "h1 center",
            "next",
            "sec ch",
            "ch ua",
            "ua platform",
            "emails",
            "certificate",
            "passive dns",
            "urls",
            "encrypt",
            "body",
            "pe32 executable",
            "ms windows",
            "intel",
            "windows control",
            "panel item",
            "dos borland",
            "executable",
            "algorithm",
            "thumbprint",
            "serial number",
            "signing ca",
            "symantec time",
            "stamping",
            "g2 name",
            "g2 issuer",
            "class",
            "code",
            "kb pe",
            "csc corporate",
            "porkbun llc",
            "gandi sas",
            "request",
            "path",
            "get https",
            "get http",
            "response",
            "cachecontrol",
            "pragma",
            "connection",
            "gmt connection",
            "accept",
            "slug",
            "as29789",
            "united",
            "unknown",
            "ransom",
            "heur",
            "server",
            "registrar abuse",
            "san rafael",
            "autodesk",
            "contact phone",
            "registrar url",
            "process32nextw",
            "create c",
            "read c",
            "writeconsolew",
            "delete",
            "write",
            "show",
            "malware",
            "write c",
            "regsetvalueexa",
            "delete c",
            "search",
            "regdword",
            "whitelisted",
            "panda banker",
            "ursnif",
            "win32",
            "persistence",
            "execution",
            "banker",
            "local",
            "domain",
            "servers",
            "pulse pulses",
            "files",
            "ip address",
            "creation date",
            "united kingdom",
            "as9009 m247",
            "ipv4",
            "pulse submit",
            "url analysis",
            "twitter",
            "as16552 tiggee",
            "as397241",
            "as397240",
            "entries",
            "cname",
            "nxdomain",
            "a nxdomain",
            "worm",
            "file samples",
            "files matching",
            "alf features",
            "denver co",
            "wewatta",
            "scan endpoints",
            "related pulses",
            "date hash",
            "showing",
            "as62597 nsone",
            "date",
            "trojanspy",
            "cookie",
            "hostmaster",
            "expiration date",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tls handshake",
            "et info",
            "getdc0x2a",
            "failure",
            "post http",
            "copy",
            "crash",
            "ascii text",
            "ascii",
            "jpeg image",
            "artemis",
            "trojan",
            "virustotal",
            "mike",
            "vipre",
            "panda",
            "win32mediadrug",
            "win324shared",
            "win32spigot",
            "hstr",
            "lowfi",
            "yara detections",
            "contacted",
            "report spam",
            "mozilla",
            "trojanclicker",
            "url http",
            "url https",
            "role title",
            "added active",
            "type indicator",
            "source domain",
            "akamai rank",
            "hostname",
            "ver2",
            "msclkidn",
            "vids0",
            "global outage",
            "cobalt strike",
            "fancy bear",
            "communications",
            "android device",
            "cnc beacon",
            "suspicious ua",
            "youtube",
            "sakula rat",
            "mivast",
            "sakula",
            "windows",
            "samuel tulach",
            "light dark",
            "samuel",
            "tulach",
            "hyperv",
            "detecting",
            "writing gui",
            "bootkits",
            "world",
            "information",
            "discovery",
            "t1027",
            "t1057",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1129",
            "capture",
            "service",
            "t1119"
          ],
          "references": [
            "autodesk.com [ Everything below was found in Autodesk [including crowdstrike & any.desk] Found in in Crowdsrike if labeled.",
            "66.254.114.234 | reflectededge.reflected.net | reflected.net | 192.0.2.0 | https://www.brazzers.com/ | brazzers.com  | brazzersnetwork.com",
            "keezmovies.com | redtube.com | tube8.com | tube8.com | youporn.com| 0.brazzers.com | www.g-tunnel.comwww.brazzers.com |",
            "Win32:Mystic ,  Win.Trojan.Xblocker-236 \u00bbFileHash-SHA256  8c59adbccc1987d13fec983f1e2be046611511b65479d1719bda77c5c90bbe21",
            "IDS Detections: TLS Handshake Failure | Alerts: network_icmp , injection",
            "Win32:BankerX-gen\\ [Trj] \u00bb FileHash-SHA256 2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c",
            "IDS Detections: Zeus Panda Banker / Ursnif Malicious SSL Certificate Detected TLS Handshake Failure",
            "Alerts: network_icmp antisandbox_idletime modifies_certificates modifies_proxy_wpad disables_proxy",
            "RedTube.com Detections: ALF:AGGR:OpcCl:95!ml , ALF:JASYP:Backdoor:Win32/Cycbot!atmn ,  Win.Downloader.117423-1 ,",
            "RedTube.com Detections: Win.Trojan.Crypt-321 ,  Win.Trojan.FakeAV-4166 ,  Win.Trojan.Fakeav-10977 ,  Win.Trojan.Fakeav-3386",
            "Crowdstrike: wildcard.352-445-1166.device.sim.to.img.sedoparking.com",
            "Crowdstrike: maxfehlinger.de http://auth.cranberry.testing.maxfehlinger.de | http://latex.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: https://traefik.cranberry.testing.maxfehlinger.de | http://traefik.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: http://watchtower.cranberry.testing.maxfehlinger.de| https://auth.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: auth.cranberry.testing.maxfehlinger.de | latex.cranberry.testing.maxfehlinger.de | traefik.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: watchtower.cranberry.testing.maxfehlinger.de | https://latex.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing\t| https://www.anyxxxtube.net/sitemap.xml",
            "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brash |",
            "Crowdstrike: autodesk.com | 0ds.autodesk.com | aknanalytics.autodesk.com | anubis.autodesk.com | autobetaint.autodesk.com",
            "Crowdstrike: autodeskarchitecture.autodesk.com | beacon-dev3.autodesk.com | boxtooffice365.autodesk.com | brahma-studio.autodesk.com",
            "Crowdstrike: cdc-stg-emea.autodesk.com | cloudcost.autodesk.com | cloudpc-stg.autodesk.com | d-s.autodesk.com |",
            "Crowdstrike: daiwahouse-learning.autodesk.com| datagovernance-dev.autodesk.com | enterprise-api-np.autodesk.com",
            "Crowdstrike: symcd.com [Certificate Subjectaltname \u00bb\u00bb anydesk.com \u00bb\u00bb http://gn.symcb.com/gn.crt Ocsp\thttp://gn.symcd.com] ANYDESK.COM-unsigned",
            "Crowdstrike: https://bat.bing.com/action/0?ti=12001672&tm=al001&Ver=2&mid=12436868-a484-4998-931c-980262982f67&sid=b92cd8f0483e11efa3c96fe28be413cb&vid=b92cdd10483e11efb1024309353d849f&vids=1&msclkid=N&pi=-740138922&lg=en-US&sw=800&sh=600&sc=24&tl=CrowdStrike%3A%20Stop%20breaches.%20Drive%20business.&p=https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2F&r=<=1022&pt=1721661968606",
            "Crowdstrike: \tbat.bing.com, https://tulach.cc, https://otx.alienvault.com/indicator/url/http://www.hallrender.com/attorney/brian-sabey",
            "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | https://www.pornhub.com/video/search?search=tsara+brashears | www.youtube.com/watch?v=GyuMozsVyYs | www.pornhub.com | www.youtube.com",
            "Crowdstrike: https://hr.employmenthero.com/rs/387-SZZ-170/images/youtube-icon-emp-hero-violet.png",
            "Crowdstrike + Autodesk.com: hallrender.com/attorney/brian-sabey www.hallrender.com/attorney/brian-sabey hallrender.com www.hallrender.com https://hallrender.com milehighmedia.com https://www.milehighmedia.com/ https://www.milehighmedia.com/legal/2257",
            "Crowdstrike + Autodesk.com: brassiere.world mail.brassiere.world webdisk.brassiere.world webmail.brassiere.world",
            "Crowdstrike + Autodesk.com: 128 + symcd.com some w/issues | 658 autodesk.com pulse some w/issues | removed any.desk & boot",
            "The more I say...Any.Desk + boot.net.anydesk.com was in OG Private CrowdsStrike pulse",
            "Above links in search results direct out with and arrow pointing out.",
            "https://otx.alienvault.com/browse/global/pulses?q=tag:%22esta%20caliente%22&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=esta%20caliente",
            "Above link opened 'esta caliente'=   'it's hot'| I did NOT do that | All connected links gone. This has become common.",
            "I didn't add pertinent findings back to Pulse. Pulse comp,eyes says ago . Couldn't submit. It's was actually a tiny pulse of autodesk.com with crowdstrike relationship references,",
            "boot.net.anydesk.com removed from my Pulse below",
            "https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "Win32:Mystic",
              "display_name": "Win32:Mystic",
              "target": null
            },
            {
              "id": "Win.Trojan.Xblocker-236",
              "display_name": "Win.Trojan.Xblocker-236",
              "target": null
            },
            {
              "id": "Ransom:Win32/Genasom",
              "display_name": "Ransom:Win32/Genasom",
              "target": "/malware/Ransom:Win32/Genasom"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:JASYP:Backdoor:Win32/Cycbot",
              "display_name": "ALF:JASYP:Backdoor:Win32/Cycbot",
              "target": null
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Usteal",
              "display_name": "TrojanSpy:Win32/Usteal",
              "target": "/malware/TrojanSpy:Win32/Usteal"
            },
            {
              "id": "Win.Trojan.PoetRat-7669676-0",
              "display_name": "Win.Trojan.PoetRat-7669676-0",
              "target": null
            },
            {
              "id": "Mivast",
              "display_name": "Mivast",
              "target": null
            },
            {
              "id": "Sakula",
              "display_name": "Sakula",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "66d89c45ddc0c7db084b75b7",
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1417,
            "FileHash-SHA1": 1165,
            "FileHash-SHA256": 6536,
            "URL": 6112,
            "domain": 1340,
            "hostname": 2654,
            "email": 15,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 19248,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "264 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67035385a884405e783f9a7e",
          "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
          "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
          "modified": "2024-11-06T01:02:24.390000",
          "created": "2024-10-07T03:20:37.224000",
          "tags": [
            "canada unknown",
            "redacted for",
            "as25825",
            "all scoreblue",
            "passive dns",
            "ipv4",
            "reverse dns",
            "next",
            "for privacy",
            "cname",
            "united states",
            "nxdomain",
            "ns nxdomain",
            "united",
            "as21928",
            "south korea",
            "as9318 sk",
            "taiwan as3462",
            "as701 verizon",
            "search",
            "maxage apt",
            "minage apt",
            "maxsize apt",
            "malware",
            "as44273 host",
            "creation date",
            "status",
            "showing",
            "record value",
            "certificate",
            "date",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "flag united",
            "domain",
            "files related",
            "intel",
            "ms windows",
            "users",
            "pe32",
            "number",
            "ascii text",
            "crlf line",
            "database",
            "english",
            "tue jun",
            "installer",
            "template",
            "trojan",
            "write",
            "registrar",
            "pulse submit",
            "url analysis",
            "files",
            "msie",
            "chrome",
            "rdds service",
            "record",
            "registrant",
            "admin",
            "tech contact",
            "name servers",
            "email please",
            "moved",
            "trojanproxy",
            "virtool",
            "as1221",
            "aaaa",
            "asnone united",
            "show",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "script urls",
            "gmt path",
            "fedora",
            "open ports",
            "nginx http",
            "server",
            "a domains",
            "gmt content",
            "set cookie",
            "gmt etag",
            "accept",
            "expiration date",
            "backdoor",
            "mirai",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "hostname",
            "verdict",
            "unknown",
            "new pulse",
            "loveland",
            "america asn",
            "Generic36.ABKD",
            "domains",
            "location canada",
            "as32133",
            "files ip",
            "address domain",
            "path max",
            "age86400 set",
            "cookie",
            "type",
            "entries",
            "script domains",
            "downloader",
            "body",
            "servers",
            "emails",
            "gmt max",
            "title",
            "meta",
            "as20940",
            "as16625 akamai",
            "west domains",
            "as4230 claro",
            "copy",
            "sabey",
            "contacted"
          ],
          "references": [
            "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
            "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
            "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
            "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
            "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
            "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
            "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
            "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
            "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
            "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
            "Domains Contacted: ntp.ubuntu.com",
            "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
            "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
            "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
            "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
            "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
            "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
            "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
            "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Taiwan",
            "Philippines",
            "India",
            "Italy",
            "Germany",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-BZ\\ [Trj]",
              "display_name": "ELF:Mirai-BZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai_Botnet_Malware",
              "display_name": "Mirai_Botnet_Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Unix.Trojan.Mirai-6976991-0",
              "display_name": "Unix.Trojan.Mirai-6976991-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.B",
              "display_name": "Backdoor:Linux/Mirai.B",
              "target": "/malware/Backdoor:Linux/Mirai.B"
            },
            {
              "id": "TrojanDownloader:Win32/Fosniw",
              "display_name": "TrojanDownloader:Win32/Fosniw",
              "target": "/malware/TrojanDownloader:Win32/Fosniw"
            },
            {
              "id": "TrojanClicker:Win32/Frosparf",
              "display_name": "TrojanClicker:Win32/Frosparf",
              "target": "/malware/TrojanClicker:Win32/Frosparf"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            }
          ],
          "industries": [
            "Legal",
            "Healthcare",
            "Education"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1230,
            "email": 16,
            "hostname": 1560,
            "URL": 3400,
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 544,
            "FileHash-SHA1": 496,
            "CVE": 1
          },
          "indicator_count": 8311,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "529 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d912c0ef3c0720da1d72a0",
          "name": "Babax Stealer Ransomware - maxfehlinger.de- autodesk,com",
          "description": "Babax Stealer Ransomware and Samas Ransom Malware CnC Beacon. Remote system access, remote desktop, injection, ransomware, CnC Beacon found in both highly trusted and unsafe enterprises. Interesting strings. Initially found several months ago in 'high profile' breaches and systems. Another user discovered a single malicious 'AnyDesk Backdoor' link. Further research showed  significant pattern matches. \nI posted my own Any.Desk Pulse after exploring from users  single hash. I was surprised to find now whitelisted link [boot.net.anydesk.com] was removed from my and other pulses after an unknown modification.",
          "modified": "2024-10-05T00:03:06.235000",
          "created": "2024-09-05T02:09:04.339000",
          "tags": [
            "all scoreblue",
            "pdf report",
            "injection",
            "malware",
            "ransomware",
            "maxfehlinger.de",
            "privacy badger",
            "swipper",
            "pegasystems",
            "crowdstrike",
            "autodesk.com",
            "autocad",
            "endgame",
            "crowdstrike.com",
            "write c",
            "delete c",
            "ascii text",
            "json",
            "as15169",
            "lredmond",
            "stwa",
            "write",
            "samas",
            "dynamicloader",
            "attempts",
            "contacted",
            "high security",
            "dynamic",
            "high",
            "t1063",
            "samas ransom",
            "cnc beacon",
            "stack pivoting",
            "discovery",
            "cloud provider",
            "reverse dns",
            "dublin",
            "ireland asn",
            "as16509",
            "dns resolutions",
            "pulses none",
            "related tags",
            "none indicator",
            "create c",
            "read c",
            "delete",
            "dock",
            "execution",
            "xport",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "memcommit",
            "code",
            "pecompact",
            "packer",
            "delphi",
            "persistence",
            "settingswpad",
            "moved",
            "gmt content",
            "0 report",
            "sea alt",
            "certificate",
            "passive dns",
            "server response",
            "google safe",
            "results aug",
            "avast avg",
            "ids",
            "showing",
            "click",
            "phishing",
            "remote access",
            "social engineering",
            "software",
            "tunneling",
            "yara",
            "united states",
            "service",
            "bot",
            "remote desktop",
            "relay",
            "loading captcha",
            "secure all"
          ],
          "references": [
            "Samas Ransom - maxfehlinger.de, autodesk, #file #hash , 104.21.14.163 (CDN) 172.67.160.10 (CDN)",
            "Any.Desk Pulse . Cites ATOAlienVault for hash: https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d",
            ".NET Framework Error: https://otx.alienvault.com/otxapi/indicators/file/screenshot/089aa13becf38d8bc289b24f6844f6ab2ebfe8d7ea0836bb8d5a616ebca9a3cc",
            "Win.Packed.Msilperseus-9956591-0: FileHash-SHA256 2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
            "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
            "Alerts: antiav_detectfile antiav_detectreg modify_proxy cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
            "Yara Detections DotNET_Reactor : \"DynamicLoader\" : \"ADVAPI32.dll/CreateRestrictedToken\"",
            "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\u00bb 192.168.122.24 \u00abto\u00bb 172.64.41.3 Suspicious Activity DNS Query",
            "Samas Ransom CnC Beacon \u00bb Source: 192.168.122.24 Destination\u00bb 104.117.233.215 =  \tMalware Beacon Samas",
            "Domains Contacted and Whitelisted: accounts.google.com | 142.250.147.84  | js.monitor.azure.com | 13.107.213.44  | clients2.googleusercontent.com\t142.251.9.132  Whitelisted\tchrome.cloudflare-dns.com",
            "PE Anomalies: checksum_header_zero ep_weird_location | Interesting Strings: https://api.ipify.org",
            "Win.Malware.Trojanx-9862538-0: FileHash-SHA256 f6b1e4c7c5d3e08828599fb7b268cac6444b3b750c0af81059d906b692a20ddd",
            "IDS Detections Samas Ransom CnC Beacon Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SN)",
            "Generickdz - Yara Detections: aPLib ,  PECompact_2xx , pecompact2 ,  PECompactv2xx ,  Delphi",
            "Generickdz - Yara Detections: PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,",
            "TrojanX Alerts: terminates_remote_process injection_rwx: modify_proxy infostealer_cookies recon_fingerprint",
            "TrojanX Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile antiav_detectreg createtool",
            "TrojanX Alerts: cape_extracted_content recon_fingerprint suricata_alert help32snapshot_module_enumeration",
            "TrojanX Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading ipc_namedpipe powershell_download",
            "Generickdz: https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
            "ALF:Ransom:Win32/Babax.SG!MTB - Yara Detections: MAL_Unknown_PWDumper_Apr18_3 ,  EnigmaProtector ,  Delphi",
            "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile",
            "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
            "ALF:Ransom:Win32/Babax.SG!MTB: 34.241.182.209  Reverse DNS ec2-34-241-182-209.eu-west-1.compute.amazonaws.com | edge-irl1.demdex.net",
            "Razy-Yara Detections: SUSP_Imphash_Mar23_3 ,  UPX",
            "Yara Detections: ConventionEngine_Keyword_Bot ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
            "CDN 104.21.14.163-Associated: URL's: http://resources.mini-box.com/online/MBD-mini2440 NEC3.5 kit/mini2440-ARM9-Board-with-NEC3.5-kit-android.pdf",
            "CDN 104.21.14.163:-Associated: URL's: http://light.80371024.workers.dev/",
            "Microsoft Ignite: https://otx.alienvault.com/otxapi/indicators/file/screenshot/2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
            "Merits further research: boot.net.anydesk.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Razy-9859339-0",
              "display_name": "Win.Malware.Razy-9859339-0",
              "target": null
            },
            {
              "id": "Win.Malware.Trojanx-9862538-0",
              "display_name": "Win.Malware.Trojanx-9862538-0",
              "target": null
            },
            {
              "id": "Win.Malware.Generickdz-9982080-0",
              "display_name": "Win.Malware.Generickdz-9982080-0",
              "target": null
            },
            {
              "id": "Win.Packed.Msilperseus-9956591-0",
              "display_name": "Win.Packed.Msilperseus-9956591-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:HackTool:Win32/DefenderControl",
              "display_name": "ALF:HeraklezEval:HackTool:Win32/DefenderControl",
              "target": null
            },
            {
              "id": "ALF:Ransom:Win32/Babax.SG!MTB",
              "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
              "target": null
            },
            {
              "id": "Samas-Samsam",
              "display_name": "Samas-Samsam",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1086",
              "name": "PowerShell",
              "display_name": "T1086 - PowerShell"
            }
          ],
          "industries": [
            "Finance",
            "Technology",
            "Telecommunications",
            "Cyber Security",
            "Civilian Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 757,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 665,
            "SSLCertFingerprint": 6,
            "domain": 120,
            "URL": 114,
            "hostname": 95,
            "email": 3
          },
          "indicator_count": 2424,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "562 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d89c45ddc0c7db084b75b7",
          "name": "Autodesk weakens CS | Unauthorized AlienVault API | Stolen pulsed",
          "description": "Critical issues within AlienVault , VT & my devices. Plugins auto installed after I opened  message from AV user. Sudden redirects to 0/ http/s.   Heavy modifications, removal of IoC's  on AV & VT  & Virus Total. Autodesk.com was under CrowdStrike  until last night. Links where vulnerabilities were originating from completely disappeared from graph I kindly kept private. Continuous mods for  months to Crowdstrike and other  pulses. [https://otx.alienvault.com/api appears in search] A page opens with Tag: \"esta caliente\" | All linked pulses Gone. Only person who frequently contacted me appears where they didn't before & These dishonest billion $ companies cover up though they are at fault for allowing ALL threat actor to be protected with  non adversarial businesses.  Besides other compromises, surprisingly Brashears porn found in Crowdstrike/Autodesk  others. Disappointing.",
          "modified": "2024-10-04T17:02:07.067000",
          "created": "2024-09-04T17:43:33.123000",
          "tags": [
            "healthy check",
            "ssl bypass",
            "domain tracker",
            "privacy badger",
            "startpage",
            "w11 pc",
            "pass",
            "iocs",
            "all scoreblue",
            "pdf report",
            "pcap",
            "stix",
            "avast avg",
            "no expiration",
            "status",
            "name servers",
            "moved",
            "h1 center",
            "next",
            "sec ch",
            "ch ua",
            "ua platform",
            "emails",
            "certificate",
            "passive dns",
            "urls",
            "encrypt",
            "body",
            "pe32 executable",
            "ms windows",
            "intel",
            "windows control",
            "panel item",
            "dos borland",
            "executable",
            "algorithm",
            "thumbprint",
            "serial number",
            "signing ca",
            "symantec time",
            "stamping",
            "g2 name",
            "g2 issuer",
            "class",
            "code",
            "kb pe",
            "csc corporate",
            "porkbun llc",
            "gandi sas",
            "request",
            "path",
            "get https",
            "get http",
            "response",
            "cachecontrol",
            "pragma",
            "connection",
            "gmt connection",
            "accept",
            "slug",
            "as29789",
            "united",
            "unknown",
            "ransom",
            "heur",
            "server",
            "registrar abuse",
            "san rafael",
            "autodesk",
            "contact phone",
            "registrar url",
            "process32nextw",
            "create c",
            "read c",
            "writeconsolew",
            "delete",
            "write",
            "show",
            "malware",
            "write c",
            "regsetvalueexa",
            "delete c",
            "search",
            "regdword",
            "whitelisted",
            "panda banker",
            "ursnif",
            "win32",
            "persistence",
            "execution",
            "banker",
            "local",
            "domain",
            "servers",
            "pulse pulses",
            "files",
            "ip address",
            "creation date",
            "united kingdom",
            "as9009 m247",
            "ipv4",
            "pulse submit",
            "url analysis",
            "twitter",
            "as16552 tiggee",
            "as397241",
            "as397240",
            "entries",
            "cname",
            "nxdomain",
            "a nxdomain",
            "worm",
            "file samples",
            "files matching",
            "alf features",
            "denver co",
            "wewatta",
            "scan endpoints",
            "related pulses",
            "date hash",
            "showing",
            "as62597 nsone",
            "date",
            "trojanspy",
            "cookie",
            "hostmaster",
            "expiration date",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tls handshake",
            "et info",
            "getdc0x2a",
            "failure",
            "post http",
            "copy",
            "crash",
            "ascii text",
            "ascii",
            "jpeg image",
            "artemis",
            "trojan",
            "virustotal",
            "mike",
            "vipre",
            "panda",
            "win32mediadrug",
            "win324shared",
            "win32spigot",
            "hstr",
            "lowfi",
            "yara detections",
            "contacted",
            "report spam",
            "mozilla",
            "trojanclicker",
            "url http",
            "url https",
            "role title",
            "added active",
            "type indicator",
            "source domain",
            "akamai rank",
            "hostname",
            "ver2",
            "msclkidn",
            "vids0",
            "global outage",
            "cobalt strike",
            "fancy bear",
            "communications",
            "android device",
            "cnc beacon",
            "suspicious ua",
            "youtube",
            "sakula rat",
            "mivast",
            "sakula",
            "windows",
            "samuel tulach",
            "light dark",
            "samuel",
            "tulach",
            "hyperv",
            "detecting",
            "writing gui",
            "bootkits",
            "world",
            "information",
            "discovery",
            "t1027",
            "t1057",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1129",
            "capture",
            "service",
            "t1119"
          ],
          "references": [
            "autodesk.com [ Everything below was found in Autodesk [including crowdstrike & any.desk] Found in in Crowdsrike if labeled.",
            "66.254.114.234 | reflectededge.reflected.net | reflected.net | 192.0.2.0 | https://www.brazzers.com/ | brazzers.com  | brazzersnetwork.com",
            "keezmovies.com | redtube.com | tube8.com | tube8.com | youporn.com| 0.brazzers.com | www.g-tunnel.comwww.brazzers.com |",
            "Win32:Mystic ,  Win.Trojan.Xblocker-236 \u00bbFileHash-SHA256  8c59adbccc1987d13fec983f1e2be046611511b65479d1719bda77c5c90bbe21",
            "IDS Detections: TLS Handshake Failure | Alerts: network_icmp , injection",
            "Win32:BankerX-gen\\ [Trj] \u00bb FileHash-SHA256 2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c",
            "IDS Detections: Zeus Panda Banker / Ursnif Malicious SSL Certificate Detected TLS Handshake Failure",
            "Alerts: network_icmp antisandbox_idletime modifies_certificates modifies_proxy_wpad disables_proxy",
            "RedTube.com Detections: ALF:AGGR:OpcCl:95!ml , ALF:JASYP:Backdoor:Win32/Cycbot!atmn ,  Win.Downloader.117423-1 ,",
            "RedTube.com Detections: Win.Trojan.Crypt-321 ,  Win.Trojan.FakeAV-4166 ,  Win.Trojan.Fakeav-10977 ,  Win.Trojan.Fakeav-3386",
            "Crowdstrike: wildcard.352-445-1166.device.sim.to.img.sedoparking.com",
            "Crowdstrike: maxfehlinger.de http://auth.cranberry.testing.maxfehlinger.de | http://latex.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: https://traefik.cranberry.testing.maxfehlinger.de | http://traefik.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: http://watchtower.cranberry.testing.maxfehlinger.de| https://auth.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: auth.cranberry.testing.maxfehlinger.de | latex.cranberry.testing.maxfehlinger.de | traefik.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: watchtower.cranberry.testing.maxfehlinger.de | https://latex.cranberry.testing.maxfehlinger.de |",
            "Crowdstrike: https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing\t| https://www.anyxxxtube.net/sitemap.xml",
            "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brash |",
            "Crowdstrike: autodesk.com | 0ds.autodesk.com | aknanalytics.autodesk.com | anubis.autodesk.com | autobetaint.autodesk.com",
            "Crowdstrike: autodeskarchitecture.autodesk.com | beacon-dev3.autodesk.com | boxtooffice365.autodesk.com | brahma-studio.autodesk.com",
            "Crowdstrike: cdc-stg-emea.autodesk.com | cloudcost.autodesk.com | cloudpc-stg.autodesk.com | d-s.autodesk.com |",
            "Crowdstrike: daiwahouse-learning.autodesk.com| datagovernance-dev.autodesk.com | enterprise-api-np.autodesk.com",
            "Crowdstrike: symcd.com [Certificate Subjectaltname \u00bb\u00bb anydesk.com \u00bb\u00bb http://gn.symcb.com/gn.crt Ocsp\thttp://gn.symcd.com] ANYDESK.COM-unsigned",
            "Crowdstrike: https://bat.bing.com/action/0?ti=12001672&tm=al001&Ver=2&mid=12436868-a484-4998-931c-980262982f67&sid=b92cd8f0483e11efa3c96fe28be413cb&vid=b92cdd10483e11efb1024309353d849f&vids=1&msclkid=N&pi=-740138922&lg=en-US&sw=800&sh=600&sc=24&tl=CrowdStrike%3A%20Stop%20breaches.%20Drive%20business.&p=https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2F&r=<=1022&pt=1721661968606",
            "Crowdstrike: \tbat.bing.com, https://tulach.cc, https://otx.alienvault.com/indicator/url/http://www.hallrender.com/attorney/brian-sabey",
            "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | https://www.pornhub.com/video/search?search=tsara+brashears | www.youtube.com/watch?v=GyuMozsVyYs | www.pornhub.com | www.youtube.com",
            "Crowdstrike: https://hr.employmenthero.com/rs/387-SZZ-170/images/youtube-icon-emp-hero-violet.png",
            "Crowdstrike + Autodesk.com: hallrender.com/attorney/brian-sabey www.hallrender.com/attorney/brian-sabey hallrender.com www.hallrender.com https://hallrender.com milehighmedia.com https://www.milehighmedia.com/ https://www.milehighmedia.com/legal/2257",
            "Crowdstrike + Autodesk.com: brassiere.world mail.brassiere.world webdisk.brassiere.world webmail.brassiere.world",
            "Crowdstrike + Autodesk.com: 128 + symcd.com some w/issues | 658 autodesk.com pulse some w/issues | removed any.desk & boot",
            "The more I say...Any.Desk + boot.net.anydesk.com was in OG Private CrowdsStrike pulse",
            "Above links in search results direct out with and arrow pointing out.",
            "https://otx.alienvault.com/browse/global/pulses?q=tag:%22esta%20caliente%22&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=esta%20caliente",
            "Above link opened 'esta caliente'=   'it's hot'| I did NOT do that | All connected links gone. This has become common.",
            "I didn't add pertinent findings back to Pulse. Pulse comp,eyes says ago . Couldn't submit. It's was actually a tiny pulse of autodesk.com with crowdstrike relationship references,",
            "boot.net.anydesk.com removed from my Pulse below",
            "https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "Win32:Mystic",
              "display_name": "Win32:Mystic",
              "target": null
            },
            {
              "id": "Win.Trojan.Xblocker-236",
              "display_name": "Win.Trojan.Xblocker-236",
              "target": null
            },
            {
              "id": "Ransom:Win32/Genasom",
              "display_name": "Ransom:Win32/Genasom",
              "target": "/malware/Ransom:Win32/Genasom"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:JASYP:Backdoor:Win32/Cycbot",
              "display_name": "ALF:JASYP:Backdoor:Win32/Cycbot",
              "target": null
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Usteal",
              "display_name": "TrojanSpy:Win32/Usteal",
              "target": "/malware/TrojanSpy:Win32/Usteal"
            },
            {
              "id": "Win.Trojan.PoetRat-7669676-0",
              "display_name": "Win.Trojan.PoetRat-7669676-0",
              "target": null
            },
            {
              "id": "Mivast",
              "display_name": "Mivast",
              "target": null
            },
            {
              "id": "Sakula",
              "display_name": "Sakula",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1417,
            "FileHash-SHA1": 1165,
            "FileHash-SHA256": 6536,
            "URL": 6112,
            "domain": 1340,
            "hostname": 2654,
            "email": 15,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 19248,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "562 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d4c125ad61ee5577639a2d",
          "name": "AnyDesk Backdoor: Ongoing",
          "description": "Part of a much larger problem...Pulse has a relationship to one of the largest data breaches in our time.",
          "modified": "2024-09-01T19:31:49.180000",
          "created": "2024-09-01T19:31:49.180000",
          "tags": [
            "click",
            "contact",
            "remote desktop",
            "address book",
            "anydesk",
            "case studies",
            "help center",
            "contact us",
            "secure all",
            "loading captcha",
            "guard",
            "scoreblue",
            "gmbh",
            "cnanynet relay",
            "cnanynet root",
            "bot",
            "yara",
            "ids",
            "service",
            "powershell",
            "tunneling",
            "injection",
            "software",
            "social engineering",
            "anydesk",
            "remote access",
            "phishing",
            "uk banks",
            "germany"
          ],
          "references": [
            "https://anydesk.com/en/downloads/thank-you?dv=win_exe",
            "Sourced by ATOAlienVault: FileHash-SHA256\t746475f67cd3456551c5cd9c6205c9754b2aef17472af1b40d41904df2337a2b",
            "Yara Detections: ConventionEngine_Keyword_Bot",
            "ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
            "High Priority Alerts: antivm_generic_disk registry_credential_store_access recon_fingerprint removes_zoneid_ads",
            "IP: 195.181.174.174\tboot.net.anydesk.com \u00bb\u00bb Reverse IP lookup: boot.net.anydesk.com | Germany\tAS60068 datacamp limited",
            "Origins found in CrowdStrike, Pega Systems, MIT and Bitdefender by Scoreblue & OctoSeek: watchtower.cranberry.testing.maxfehlinger.de"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [
            "Finance",
            "Technology",
            "Telecommunications",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1,
            "hostname": 8,
            "domain": 2,
            "URL": 14,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 26,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "595 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6681f6f2cd37f508d362c2db",
          "name": "PegaSystems | Apple iOS iPad | Malicious | Tracking",
          "description": "",
          "modified": "2024-07-01T00:23:14.084000",
          "created": "2024-07-01T00:23:14.084000",
          "tags": [
            "united",
            "passive dns",
            "as14449",
            "moved",
            "urls",
            "authority",
            "body",
            "object",
            "certificate",
            "scan endpoints",
            "unknown",
            "date",
            "as11377",
            "as16552 tiggee",
            "as174 cogent",
            "ireland unknown",
            "cname",
            "as11404 wave",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "ipv4",
            "pulse submit",
            "url analysis",
            "dynamicloader",
            "port",
            "destination",
            "high",
            "medium",
            "windows",
            "cmd c",
            "default",
            "document file",
            "v2 document",
            "write",
            "copy",
            "name verdict",
            "falcon sandbox",
            "sha1",
            "sha256",
            "misc attack",
            "mitre att",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "hybrid",
            "starfield",
            "click",
            "strings",
            "core",
            "contact",
            "as396982 google",
            "historical ssl",
            "referrer",
            "co20230203",
            "malware",
            "discord",
            "credential",
            "lunar client",
            "trendmicro av",
            "neural netw",
            "upscayl",
            "steam game",
            "server",
            "domain status",
            "registrar abuse",
            "google",
            "community",
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "664fceb9e0acfc0baee851c2",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 75,
            "URL": 3584,
            "domain": 836,
            "hostname": 1749,
            "FileHash-SHA256": 726,
            "FileHash-MD5": 88,
            "SSLCertFingerprint": 9,
            "email": 1
          },
          "indicator_count": 7068,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "658 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "664fceb9e0acfc0baee851c2",
          "name": "PegaSystems | Apple iOS iPad | Malicious | Tracking",
          "description": "Tags, findings of this report is auto generated by Level Blue OTX.AlienVault.\nPer my research: \nMalicious Score: 10/10\nAlerts: Alerts\nransomware_file_modifications, script_created_process, stealth_network, infostealer_cookies, suspicious_command_tools,\ndynamic_function_loading, reads_self,\nstealth_window, cmdline_http_link, uses_windows_utilities, antidebug_setunhandledexceptionfilter, cmdline_terminate, stealth_timeout,\n\nAffected Device: Apples iOS Ipad, Update 17.5.1\npegasystems.voicestorm.com -Cisco Umbrella {permanently moved as of 5.23.2024} found in Apple link - http://apps.apple.com/app/, nsis, downloaders,injection, data local, remotewd devices, tracking,",
          "modified": "2024-06-22T23:05:37.577000",
          "created": "2024-05-23T23:18:17.563000",
          "tags": [
            "united",
            "passive dns",
            "as14449",
            "moved",
            "urls",
            "authority",
            "body",
            "object",
            "certificate",
            "scan endpoints",
            "unknown",
            "date",
            "as11377",
            "as16552 tiggee",
            "as174 cogent",
            "ireland unknown",
            "cname",
            "as11404 wave",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "ipv4",
            "pulse submit",
            "url analysis",
            "dynamicloader",
            "port",
            "destination",
            "high",
            "medium",
            "windows",
            "cmd c",
            "default",
            "document file",
            "v2 document",
            "write",
            "copy",
            "name verdict",
            "falcon sandbox",
            "sha1",
            "sha256",
            "misc attack",
            "mitre att",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "hybrid",
            "starfield",
            "click",
            "strings",
            "core",
            "contact",
            "as396982 google",
            "historical ssl",
            "referrer",
            "co20230203",
            "malware",
            "discord",
            "credential",
            "lunar client",
            "trendmicro av",
            "neural netw",
            "upscayl",
            "steam game",
            "server",
            "domain status",
            "registrar abuse",
            "google",
            "community",
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 75,
            "URL": 3584,
            "domain": 836,
            "hostname": 1749,
            "FileHash-SHA256": 726,
            "FileHash-MD5": 88,
            "SSLCertFingerprint": 9,
            "email": 1
          },
          "indicator_count": 7068,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "666 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Above link opened 'esta caliente'=   'it's hot'| I did NOT do that | All connected links gone. This has become common.",
        "Samas Ransom CnC Beacon \u00bb Source: 192.168.122.24 Destination\u00bb 104.117.233.215 =  \tMalware Beacon Samas",
        "Crowdstrike: autodeskarchitecture.autodesk.com | beacon-dev3.autodesk.com | boxtooffice365.autodesk.com | brahma-studio.autodesk.com",
        "The more I say...Any.Desk + boot.net.anydesk.com was in OG Private CrowdsStrike pulse",
        "Microsoft Ignite: https://otx.alienvault.com/otxapi/indicators/file/screenshot/2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
        "Razy-Yara Detections: SUSP_Imphash_Mar23_3 ,  UPX",
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "Alerts: network_icmp antisandbox_idletime modifies_certificates modifies_proxy_wpad disables_proxy",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
        "Crowdstrike: cdc-stg-emea.autodesk.com | cloudcost.autodesk.com | cloudpc-stg.autodesk.com | d-s.autodesk.com |",
        "Alerts: antiav_detectfile antiav_detectreg modify_proxy cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brash |",
        "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\u00bb 192.168.122.24 \u00abto\u00bb 172.64.41.3 Suspicious Activity DNS Query",
        "Crowdstrike: https://hr.employmenthero.com/rs/387-SZZ-170/images/youtube-icon-emp-hero-violet.png",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "Win.Malware.Trojanx-9862538-0: FileHash-SHA256 f6b1e4c7c5d3e08828599fb7b268cac6444b3b750c0af81059d906b692a20ddd",
        "https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d",
        "Crowdstrike: \tbat.bing.com, https://tulach.cc, https://otx.alienvault.com/indicator/url/http://www.hallrender.com/attorney/brian-sabey",
        "Yara Detections: ConventionEngine_Keyword_Bot ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
        "ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
        "IDS Detections: Zeus Panda Banker / Ursnif Malicious SSL Certificate Detected TLS Handshake Failure",
        "Win.Packed.Msilperseus-9956591-0: FileHash-SHA256 2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
        "I didn't add pertinent findings back to Pulse. Pulse comp,eyes says ago . Couldn't submit. It's was actually a tiny pulse of autodesk.com with crowdstrike relationship references,",
        "Domains Contacted and Whitelisted: accounts.google.com | 142.250.147.84  | js.monitor.azure.com | 13.107.213.44  | clients2.googleusercontent.com\t142.251.9.132  Whitelisted\tchrome.cloudflare-dns.com",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "Crowdstrike: wildcard.352-445-1166.device.sim.to.img.sedoparking.com",
        "Crowdstrike + Autodesk.com: brassiere.world mail.brassiere.world webdisk.brassiere.world webmail.brassiere.world",
        "Generickdz - Yara Detections: aPLib ,  PECompact_2xx , pecompact2 ,  PECompactv2xx ,  Delphi",
        "Win32:BankerX-gen\\ [Trj] \u00bb FileHash-SHA256 2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c",
        ".NET Framework Error: https://otx.alienvault.com/otxapi/indicators/file/screenshot/089aa13becf38d8bc289b24f6844f6ab2ebfe8d7ea0836bb8d5a616ebca9a3cc",
        "Above links in search results direct out with and arrow pointing out.",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
        "RedTube.com Detections: Win.Trojan.Crypt-321 ,  Win.Trojan.FakeAV-4166 ,  Win.Trojan.Fakeav-10977 ,  Win.Trojan.Fakeav-3386",
        "Yara Detections DotNET_Reactor : \"DynamicLoader\" : \"ADVAPI32.dll/CreateRestrictedToken\"",
        "Crowdstrike: https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing\t| https://www.anyxxxtube.net/sitemap.xml",
        "Crowdstrike: auth.cranberry.testing.maxfehlinger.de | latex.cranberry.testing.maxfehlinger.de | traefik.cranberry.testing.maxfehlinger.de |",
        "ALF:Ransom:Win32/Babax.SG!MTB: 34.241.182.209  Reverse DNS ec2-34-241-182-209.eu-west-1.compute.amazonaws.com | edge-irl1.demdex.net",
        "PE Anomalies: checksum_header_zero ep_weird_location | Interesting Strings: https://api.ipify.org",
        "CDN 104.21.14.163-Associated: URL's: http://resources.mini-box.com/online/MBD-mini2440 NEC3.5 kit/mini2440-ARM9-Board-with-NEC3.5-kit-android.pdf",
        "IP: 195.181.174.174\tboot.net.anydesk.com \u00bb\u00bb Reverse IP lookup: boot.net.anydesk.com | Germany\tAS60068 datacamp limited",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | https://www.pornhub.com/video/search?search=tsara+brashears | www.youtube.com/watch?v=GyuMozsVyYs | www.pornhub.com | www.youtube.com",
        "boot.net.anydesk.com removed from my Pulse below",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "https://anydesk.com/en/downloads/thank-you?dv=win_exe",
        "Domains Contacted: ntp.ubuntu.com",
        "Samas Ransom - maxfehlinger.de, autodesk, #file #hash , 104.21.14.163 (CDN) 172.67.160.10 (CDN)",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc.",
        "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "Crowdstrike: daiwahouse-learning.autodesk.com| datagovernance-dev.autodesk.com | enterprise-api-np.autodesk.com",
        "autodesk.com [ Everything below was found in Autodesk [including crowdstrike & any.desk] Found in in Crowdsrike if labeled.",
        "Origins found in CrowdStrike, Pega Systems, MIT and Bitdefender by Scoreblue & OctoSeek: watchtower.cranberry.testing.maxfehlinger.de",
        "Crowdstrike: autodesk.com | 0ds.autodesk.com | aknanalytics.autodesk.com | anubis.autodesk.com | autobetaint.autodesk.com",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "TrojanX Alerts: cape_extracted_content recon_fingerprint suricata_alert help32snapshot_module_enumeration",
        "Crowdstrike + Autodesk.com: hallrender.com/attorney/brian-sabey www.hallrender.com/attorney/brian-sabey hallrender.com www.hallrender.com https://hallrender.com milehighmedia.com https://www.milehighmedia.com/ https://www.milehighmedia.com/legal/2257",
        "Crowdstrike: maxfehlinger.de http://auth.cranberry.testing.maxfehlinger.de | http://latex.cranberry.testing.maxfehlinger.de |",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "keezmovies.com | redtube.com | tube8.com | tube8.com | youporn.com| 0.brazzers.com | www.g-tunnel.comwww.brazzers.com |",
        "Any.Desk Pulse . Cites ATOAlienVault for hash: https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "Merits further research: boot.net.anydesk.com",
        "Win32:Mystic ,  Win.Trojan.Xblocker-236 \u00bbFileHash-SHA256  8c59adbccc1987d13fec983f1e2be046611511b65479d1719bda77c5c90bbe21",
        "Crowdstrike + Autodesk.com: 128 + symcd.com some w/issues | 658 autodesk.com pulse some w/issues | removed any.desk & boot",
        "ALF:Ransom:Win32/Babax.SG!MTB - Yara Detections: MAL_Unknown_PWDumper_Apr18_3 ,  EnigmaProtector ,  Delphi",
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "TrojanX Alerts: terminates_remote_process injection_rwx: modify_proxy infostealer_cookies recon_fingerprint",
        "Yara Detections: ConventionEngine_Keyword_Bot",
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "IDS Detections: TLS Handshake Failure | Alerts: network_icmp , injection",
        "TrojanX Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading ipc_namedpipe powershell_download",
        "Crowdstrike: http://watchtower.cranberry.testing.maxfehlinger.de| https://auth.cranberry.testing.maxfehlinger.de |",
        "High Priority Alerts: antivm_generic_disk registry_credential_store_access recon_fingerprint removes_zoneid_ads",
        "66.254.114.234 | reflectededge.reflected.net | reflected.net | 192.0.2.0 | https://www.brazzers.com/ | brazzers.com  | brazzersnetwork.com",
        "https://otx.alienvault.com/browse/global/pulses?q=tag:%22esta%20caliente%22&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=esta%20caliente",
        "Crowdstrike: https://bat.bing.com/action/0?ti=12001672&tm=al001&Ver=2&mid=12436868-a484-4998-931c-980262982f67&sid=b92cd8f0483e11efa3c96fe28be413cb&vid=b92cdd10483e11efb1024309353d849f&vids=1&msclkid=N&pi=-740138922&lg=en-US&sw=800&sh=600&sc=24&tl=CrowdStrike%3A%20Stop%20breaches.%20Drive%20business.&p=https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2F&r=<=1022&pt=1721661968606",
        "Sourced by ATOAlienVault: FileHash-SHA256\t746475f67cd3456551c5cd9c6205c9754b2aef17472af1b40d41904df2337a2b",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "TrojanX Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile antiav_detectreg createtool",
        "Crowdstrike: watchtower.cranberry.testing.maxfehlinger.de | https://latex.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: https://traefik.cranberry.testing.maxfehlinger.de | http://traefik.cranberry.testing.maxfehlinger.de |",
        "CDN 104.21.14.163:-Associated: URL's: http://light.80371024.workers.dev/",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "IDS Detections Samas Ransom CnC Beacon Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SN)",
        "Generickdz: https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
        "RedTube.com Detections: ALF:AGGR:OpcCl:95!ml , ALF:JASYP:Backdoor:Win32/Cycbot!atmn ,  Win.Downloader.117423-1 ,",
        "Crowdstrike: symcd.com [Certificate Subjectaltname \u00bb\u00bb anydesk.com \u00bb\u00bb http://gn.symcb.com/gn.crt Ocsp\thttp://gn.symcd.com] ANYDESK.COM-unsigned",
        "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile",
        "Generickdz - Yara Detections: PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojandownloader:win32/fosniw",
            "Sakula",
            "Win.malware.generickdz-9982080-0",
            "Trojanclicker:win32/frosparf",
            "Samas-samsam",
            "Mirai",
            "Alf:heraklezeval:hacktool:win32/defendercontrol",
            "#lowfienabledtcontinueafterunpacking",
            "Win.trojan.xblocker-236",
            "Trojanspy:win32/usteal",
            "Trojanspy",
            "Unix.trojan.mirai-6976991-0",
            "Mirai_botnet_malware",
            "Win.malware.razy-9859339-0",
            "Mivast",
            "Alf:ransom:win32/babax.sg!mtb",
            "Trojan:win32/zombie.a",
            "Win.trojan.poetrat-7669676-0",
            "Ransom:win32/genasom",
            "Backdoor:linux/mirai.b",
            "Win.packed.msilperseus-9956591-0",
            "Elf:mirai-bz\\ [trj]",
            "Win.malware.trojanx-9862538-0",
            "Worm:win32/autorun",
            "Win32:mystic",
            "Alf:jasyp:backdoor:win32/cycbot"
          ],
          "industries": [
            "Finance",
            "Civilian society",
            "Legal",
            "Cyber security",
            "Civil society",
            "Education",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "unique_indicators": 37279
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/maxfehlinger.de",
    "whois": "http://whois.domaintools.com/maxfehlinger.de",
    "domain": "maxfehlinger.de",
    "hostname": "auth.cranberry.testing.maxfehlinger.de"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "6888a85aa32aab22f638d0e6",
      "name": "Autodesk issue in CrowdStrike prior to outage | [by scoreblue]",
      "description": "",
      "modified": "2025-07-29T10:54:18.501000",
      "created": "2025-07-29T10:54:18.501000",
      "tags": [
        "healthy check",
        "ssl bypass",
        "domain tracker",
        "privacy badger",
        "startpage",
        "w11 pc",
        "pass",
        "iocs",
        "all scoreblue",
        "pdf report",
        "pcap",
        "stix",
        "avast avg",
        "no expiration",
        "status",
        "name servers",
        "moved",
        "h1 center",
        "next",
        "sec ch",
        "ch ua",
        "ua platform",
        "emails",
        "certificate",
        "passive dns",
        "urls",
        "encrypt",
        "body",
        "pe32 executable",
        "ms windows",
        "intel",
        "windows control",
        "panel item",
        "dos borland",
        "executable",
        "algorithm",
        "thumbprint",
        "serial number",
        "signing ca",
        "symantec time",
        "stamping",
        "g2 name",
        "g2 issuer",
        "class",
        "code",
        "kb pe",
        "csc corporate",
        "porkbun llc",
        "gandi sas",
        "request",
        "path",
        "get https",
        "get http",
        "response",
        "cachecontrol",
        "pragma",
        "connection",
        "gmt connection",
        "accept",
        "slug",
        "as29789",
        "united",
        "unknown",
        "ransom",
        "heur",
        "server",
        "registrar abuse",
        "san rafael",
        "autodesk",
        "contact phone",
        "registrar url",
        "process32nextw",
        "create c",
        "read c",
        "writeconsolew",
        "delete",
        "write",
        "show",
        "malware",
        "write c",
        "regsetvalueexa",
        "delete c",
        "search",
        "regdword",
        "whitelisted",
        "panda banker",
        "ursnif",
        "win32",
        "persistence",
        "execution",
        "banker",
        "local",
        "domain",
        "servers",
        "pulse pulses",
        "files",
        "ip address",
        "creation date",
        "united kingdom",
        "as9009 m247",
        "ipv4",
        "pulse submit",
        "url analysis",
        "twitter",
        "as16552 tiggee",
        "as397241",
        "as397240",
        "entries",
        "cname",
        "nxdomain",
        "a nxdomain",
        "worm",
        "file samples",
        "files matching",
        "alf features",
        "denver co",
        "wewatta",
        "scan endpoints",
        "related pulses",
        "date hash",
        "showing",
        "as62597 nsone",
        "date",
        "trojanspy",
        "cookie",
        "hostmaster",
        "expiration date",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tls handshake",
        "et info",
        "getdc0x2a",
        "failure",
        "post http",
        "copy",
        "crash",
        "ascii text",
        "ascii",
        "jpeg image",
        "artemis",
        "trojan",
        "virustotal",
        "mike",
        "vipre",
        "panda",
        "win32mediadrug",
        "win324shared",
        "win32spigot",
        "hstr",
        "lowfi",
        "yara detections",
        "contacted",
        "report spam",
        "mozilla",
        "trojanclicker",
        "url http",
        "url https",
        "role title",
        "added active",
        "type indicator",
        "source domain",
        "akamai rank",
        "hostname",
        "ver2",
        "msclkidn",
        "vids0",
        "global outage",
        "cobalt strike",
        "fancy bear",
        "communications",
        "android device",
        "cnc beacon",
        "suspicious ua",
        "youtube",
        "sakula rat",
        "mivast",
        "sakula",
        "windows",
        "samuel tulach",
        "light dark",
        "samuel",
        "tulach",
        "hyperv",
        "detecting",
        "writing gui",
        "bootkits",
        "world",
        "information",
        "discovery",
        "t1027",
        "t1057",
        "t1071",
        "protocol",
        "t1105",
        "tool transfer",
        "t1129",
        "capture",
        "service",
        "t1119"
      ],
      "references": [
        "autodesk.com [ Everything below was found in Autodesk [including crowdstrike & any.desk] Found in in Crowdsrike if labeled.",
        "66.254.114.234 | reflectededge.reflected.net | reflected.net | 192.0.2.0 | https://www.brazzers.com/ | brazzers.com  | brazzersnetwork.com",
        "keezmovies.com | redtube.com | tube8.com | tube8.com | youporn.com| 0.brazzers.com | www.g-tunnel.comwww.brazzers.com |",
        "Win32:Mystic ,  Win.Trojan.Xblocker-236 \u00bbFileHash-SHA256  8c59adbccc1987d13fec983f1e2be046611511b65479d1719bda77c5c90bbe21",
        "IDS Detections: TLS Handshake Failure | Alerts: network_icmp , injection",
        "Win32:BankerX-gen\\ [Trj] \u00bb FileHash-SHA256 2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c",
        "IDS Detections: Zeus Panda Banker / Ursnif Malicious SSL Certificate Detected TLS Handshake Failure",
        "Alerts: network_icmp antisandbox_idletime modifies_certificates modifies_proxy_wpad disables_proxy",
        "RedTube.com Detections: ALF:AGGR:OpcCl:95!ml , ALF:JASYP:Backdoor:Win32/Cycbot!atmn ,  Win.Downloader.117423-1 ,",
        "RedTube.com Detections: Win.Trojan.Crypt-321 ,  Win.Trojan.FakeAV-4166 ,  Win.Trojan.Fakeav-10977 ,  Win.Trojan.Fakeav-3386",
        "Crowdstrike: wildcard.352-445-1166.device.sim.to.img.sedoparking.com",
        "Crowdstrike: maxfehlinger.de http://auth.cranberry.testing.maxfehlinger.de | http://latex.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: https://traefik.cranberry.testing.maxfehlinger.de | http://traefik.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: http://watchtower.cranberry.testing.maxfehlinger.de| https://auth.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: auth.cranberry.testing.maxfehlinger.de | latex.cranberry.testing.maxfehlinger.de | traefik.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: watchtower.cranberry.testing.maxfehlinger.de | https://latex.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing\t| https://www.anyxxxtube.net/sitemap.xml",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brash |",
        "Crowdstrike: autodesk.com | 0ds.autodesk.com | aknanalytics.autodesk.com | anubis.autodesk.com | autobetaint.autodesk.com",
        "Crowdstrike: autodeskarchitecture.autodesk.com | beacon-dev3.autodesk.com | boxtooffice365.autodesk.com | brahma-studio.autodesk.com",
        "Crowdstrike: cdc-stg-emea.autodesk.com | cloudcost.autodesk.com | cloudpc-stg.autodesk.com | d-s.autodesk.com |",
        "Crowdstrike: daiwahouse-learning.autodesk.com| datagovernance-dev.autodesk.com | enterprise-api-np.autodesk.com",
        "Crowdstrike: symcd.com [Certificate Subjectaltname \u00bb\u00bb anydesk.com \u00bb\u00bb http://gn.symcb.com/gn.crt Ocsp\thttp://gn.symcd.com] ANYDESK.COM-unsigned",
        "Crowdstrike: https://bat.bing.com/action/0?ti=12001672&tm=al001&Ver=2&mid=12436868-a484-4998-931c-980262982f67&sid=b92cd8f0483e11efa3c96fe28be413cb&vid=b92cdd10483e11efb1024309353d849f&vids=1&msclkid=N&pi=-740138922&lg=en-US&sw=800&sh=600&sc=24&tl=CrowdStrike%3A%20Stop%20breaches.%20Drive%20business.&p=https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2F&r=<=1022&pt=1721661968606",
        "Crowdstrike: \tbat.bing.com, https://tulach.cc, https://otx.alienvault.com/indicator/url/http://www.hallrender.com/attorney/brian-sabey",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | https://www.pornhub.com/video/search?search=tsara+brashears | www.youtube.com/watch?v=GyuMozsVyYs | www.pornhub.com | www.youtube.com",
        "Crowdstrike: https://hr.employmenthero.com/rs/387-SZZ-170/images/youtube-icon-emp-hero-violet.png",
        "Crowdstrike + Autodesk.com: hallrender.com/attorney/brian-sabey www.hallrender.com/attorney/brian-sabey hallrender.com www.hallrender.com https://hallrender.com milehighmedia.com https://www.milehighmedia.com/ https://www.milehighmedia.com/legal/2257",
        "Crowdstrike + Autodesk.com: brassiere.world mail.brassiere.world webdisk.brassiere.world webmail.brassiere.world",
        "Crowdstrike + Autodesk.com: 128 + symcd.com some w/issues | 658 autodesk.com pulse some w/issues | removed any.desk & boot",
        "The more I say...Any.Desk + boot.net.anydesk.com was in OG Private CrowdsStrike pulse",
        "Above links in search results direct out with and arrow pointing out.",
        "https://otx.alienvault.com/browse/global/pulses?q=tag:%22esta%20caliente%22&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=esta%20caliente",
        "Above link opened 'esta caliente'=   'it's hot'| I did NOT do that | All connected links gone. This has become common.",
        "I didn't add pertinent findings back to Pulse. Pulse comp,eyes says ago . Couldn't submit. It's was actually a tiny pulse of autodesk.com with crowdstrike relationship references,",
        "boot.net.anydesk.com removed from my Pulse below",
        "https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "Win32:Mystic",
          "display_name": "Win32:Mystic",
          "target": null
        },
        {
          "id": "Win.Trojan.Xblocker-236",
          "display_name": "Win.Trojan.Xblocker-236",
          "target": null
        },
        {
          "id": "Ransom:Win32/Genasom",
          "display_name": "Ransom:Win32/Genasom",
          "target": "/malware/Ransom:Win32/Genasom"
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:JASYP:Backdoor:Win32/Cycbot",
          "display_name": "ALF:JASYP:Backdoor:Win32/Cycbot",
          "target": null
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Usteal",
          "display_name": "TrojanSpy:Win32/Usteal",
          "target": "/malware/TrojanSpy:Win32/Usteal"
        },
        {
          "id": "Win.Trojan.PoetRat-7669676-0",
          "display_name": "Win.Trojan.PoetRat-7669676-0",
          "target": null
        },
        {
          "id": "Mivast",
          "display_name": "Mivast",
          "target": null
        },
        {
          "id": "Sakula",
          "display_name": "Sakula",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "66d89c45ddc0c7db084b75b7",
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1417,
        "FileHash-SHA1": 1165,
        "FileHash-SHA256": 6536,
        "URL": 6112,
        "domain": 1340,
        "hostname": 2654,
        "email": 15,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 19248,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "264 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67035385a884405e783f9a7e",
      "name": "Mirai_Botnet_Malware | Healthcare \u00bb savethemalesdenver.com  |",
      "description": "Impacting multiple Colorado medical facilities and educational institutions and patients. || Malware Families\nBackdoor:Linux/Mirai.B\nELF:Mirai-BZ\\ [Trj]\nMirai\nMirai_Botnet_Malware\nTrojan:Win32/Zombie.A\nTrojanClicker:Win32/Frosparf\nTrojanDownloader:Win32/Fosniw\nUnix.Trojan.Mirai-6976991-0\nAd",
      "modified": "2024-11-06T01:02:24.390000",
      "created": "2024-10-07T03:20:37.224000",
      "tags": [
        "canada unknown",
        "redacted for",
        "as25825",
        "all scoreblue",
        "passive dns",
        "ipv4",
        "reverse dns",
        "next",
        "for privacy",
        "cname",
        "united states",
        "nxdomain",
        "ns nxdomain",
        "united",
        "as21928",
        "south korea",
        "as9318 sk",
        "taiwan as3462",
        "as701 verizon",
        "search",
        "maxage apt",
        "minage apt",
        "maxsize apt",
        "malware",
        "as44273 host",
        "creation date",
        "status",
        "showing",
        "record value",
        "certificate",
        "date",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "flag united",
        "domain",
        "files related",
        "intel",
        "ms windows",
        "users",
        "pe32",
        "number",
        "ascii text",
        "crlf line",
        "database",
        "english",
        "tue jun",
        "installer",
        "template",
        "trojan",
        "write",
        "registrar",
        "pulse submit",
        "url analysis",
        "files",
        "msie",
        "chrome",
        "rdds service",
        "record",
        "registrant",
        "admin",
        "tech contact",
        "name servers",
        "email please",
        "moved",
        "trojanproxy",
        "virtool",
        "as1221",
        "aaaa",
        "asnone united",
        "show",
        "filehash",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "script urls",
        "gmt path",
        "fedora",
        "open ports",
        "nginx http",
        "server",
        "a domains",
        "gmt content",
        "set cookie",
        "gmt etag",
        "accept",
        "expiration date",
        "backdoor",
        "mirai",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "hostname",
        "verdict",
        "unknown",
        "new pulse",
        "loveland",
        "america asn",
        "Generic36.ABKD",
        "domains",
        "location canada",
        "as32133",
        "files ip",
        "address domain",
        "path max",
        "age86400 set",
        "cookie",
        "type",
        "entries",
        "script domains",
        "downloader",
        "body",
        "servers",
        "emails",
        "gmt max",
        "title",
        "meta",
        "as20940",
        "as16625 akamai",
        "west domains",
        "as4230 claro",
        "copy",
        "sabey",
        "contacted"
      ],
      "references": [
        "savethemalesdenver.com \u00bb https://www.uchealthcares.org | myuchealth.net | 168.200.5.63 | http://ITSupport.uchealth.org",
        "bestofus.org Location: United States of America ASN AS18693 university of colorado hospital",
        "https://floorgoddijn.nl/3798393-dad-dont-my-image-hole-fuck-ass.html",
        "https://hypnosen.fr/4306769-women-xxvideos-matured-village-african-scene-wapdam.html",
        "https://kayleighvandalen.nl/8455490-up-hot-bottoms-xxxonxxx-pics-galleries.html",
        "https://maisonduweb3.fr/6014324-porn-you-ebony-pics-black-xxx.html",
        "https://mtl-plomberie.fr/1210582-sperm-release-can-pictures-that-naija.html",
        "https://mtl-plomberie.fr/2536532-\u1200\u1260\u123b-video-xxx.html",
        "FileHash-SHA256 cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4",
        "Yara Detections: Mirai_Botnet_Malware Alerts: dead_host network_icmp nolookup_communication",
        "Domains Contacted: ntp.ubuntu.com",
        "IP\u2019s Contacted:  1.0.128.143  1.10.54.226  1.107.217.150  1.112.34.224  1.114.165.87  1.116.76.208  1.118.37.88  1.121.139.226  1.122.96.75 1.114.207.168",
        "device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com",
        "Trojan:Win32/Zombie.A FileHash-SHA256  ff43920cf098063475b4c62cd63e550fb783e3be1cf7458688b5c1d2d94c6830",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "cpe-1-159-170-17.wb05.wa.asp.telstra.net",
        "ELF:Mirai-BZ\\ [Trj] \u00bb device-290db215-637a-441f-b5f4-81bf8bd75ae5.remotewd.com | 1.159.170.17 | Perth,  Australia ASN AS1221 telstra corporation",
        "ELF:Mirai-BZ\\ [Trj]  cc0f195fe54b9981b1ea3815e44b85a0fb3571be732bd5b4034f57690436f4c4 | Australia ASN AS1221 telstra corporation",
        "Backdoor:Linux/Mirai.B FileHash-SHA1 5df4c3322a68750c6b0c931e8ebebaa60c0a0555",
        "Yara Detections: Mirai_Botnet_Malware ,  MAL_ELF_LNX_Mirai_Oct10_2 ,  SUSP_XORed_Mozilla ,  is__elf",
        "198.49.6.6 \u00bb Loveland,  United States of America ASN AS25825 poudre valley health care inc."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "Taiwan",
        "Philippines",
        "India",
        "Italy",
        "Germany",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-BZ\\ [Trj]",
          "display_name": "ELF:Mirai-BZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai_Botnet_Malware",
          "display_name": "Mirai_Botnet_Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Unix.Trojan.Mirai-6976991-0",
          "display_name": "Unix.Trojan.Mirai-6976991-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.B",
          "display_name": "Backdoor:Linux/Mirai.B",
          "target": "/malware/Backdoor:Linux/Mirai.B"
        },
        {
          "id": "TrojanDownloader:Win32/Fosniw",
          "display_name": "TrojanDownloader:Win32/Fosniw",
          "target": "/malware/TrojanDownloader:Win32/Fosniw"
        },
        {
          "id": "TrojanClicker:Win32/Frosparf",
          "display_name": "TrojanClicker:Win32/Frosparf",
          "target": "/malware/TrojanClicker:Win32/Frosparf"
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        }
      ],
      "industries": [
        "Legal",
        "Healthcare",
        "Education"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1230,
        "email": 16,
        "hostname": 1560,
        "URL": 3400,
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 544,
        "FileHash-SHA1": 496,
        "CVE": 1
      },
      "indicator_count": 8311,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "529 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d912c0ef3c0720da1d72a0",
      "name": "Babax Stealer Ransomware - maxfehlinger.de- autodesk,com",
      "description": "Babax Stealer Ransomware and Samas Ransom Malware CnC Beacon. Remote system access, remote desktop, injection, ransomware, CnC Beacon found in both highly trusted and unsafe enterprises. Interesting strings. Initially found several months ago in 'high profile' breaches and systems. Another user discovered a single malicious 'AnyDesk Backdoor' link. Further research showed  significant pattern matches. \nI posted my own Any.Desk Pulse after exploring from users  single hash. I was surprised to find now whitelisted link [boot.net.anydesk.com] was removed from my and other pulses after an unknown modification.",
      "modified": "2024-10-05T00:03:06.235000",
      "created": "2024-09-05T02:09:04.339000",
      "tags": [
        "all scoreblue",
        "pdf report",
        "injection",
        "malware",
        "ransomware",
        "maxfehlinger.de",
        "privacy badger",
        "swipper",
        "pegasystems",
        "crowdstrike",
        "autodesk.com",
        "autocad",
        "endgame",
        "crowdstrike.com",
        "write c",
        "delete c",
        "ascii text",
        "json",
        "as15169",
        "lredmond",
        "stwa",
        "write",
        "samas",
        "dynamicloader",
        "attempts",
        "contacted",
        "high security",
        "dynamic",
        "high",
        "t1063",
        "samas ransom",
        "cnc beacon",
        "stack pivoting",
        "discovery",
        "cloud provider",
        "reverse dns",
        "dublin",
        "ireland asn",
        "as16509",
        "dns resolutions",
        "pulses none",
        "related tags",
        "none indicator",
        "create c",
        "read c",
        "delete",
        "dock",
        "execution",
        "xport",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "memcommit",
        "code",
        "pecompact",
        "packer",
        "delphi",
        "persistence",
        "settingswpad",
        "moved",
        "gmt content",
        "0 report",
        "sea alt",
        "certificate",
        "passive dns",
        "server response",
        "google safe",
        "results aug",
        "avast avg",
        "ids",
        "showing",
        "click",
        "phishing",
        "remote access",
        "social engineering",
        "software",
        "tunneling",
        "yara",
        "united states",
        "service",
        "bot",
        "remote desktop",
        "relay",
        "loading captcha",
        "secure all"
      ],
      "references": [
        "Samas Ransom - maxfehlinger.de, autodesk, #file #hash , 104.21.14.163 (CDN) 172.67.160.10 (CDN)",
        "Any.Desk Pulse . Cites ATOAlienVault for hash: https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d",
        ".NET Framework Error: https://otx.alienvault.com/otxapi/indicators/file/screenshot/089aa13becf38d8bc289b24f6844f6ab2ebfe8d7ea0836bb8d5a616ebca9a3cc",
        "Win.Packed.Msilperseus-9956591-0: FileHash-SHA256 2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot stealth_file cape_detected_threat",
        "Alerts: antiav_detectfile antiav_detectreg modify_proxy cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
        "Yara Detections DotNET_Reactor : \"DynamicLoader\" : \"ADVAPI32.dll/CreateRestrictedToken\"",
        "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\u00bb 192.168.122.24 \u00abto\u00bb 172.64.41.3 Suspicious Activity DNS Query",
        "Samas Ransom CnC Beacon \u00bb Source: 192.168.122.24 Destination\u00bb 104.117.233.215 =  \tMalware Beacon Samas",
        "Domains Contacted and Whitelisted: accounts.google.com | 142.250.147.84  | js.monitor.azure.com | 13.107.213.44  | clients2.googleusercontent.com\t142.251.9.132  Whitelisted\tchrome.cloudflare-dns.com",
        "PE Anomalies: checksum_header_zero ep_weird_location | Interesting Strings: https://api.ipify.org",
        "Win.Malware.Trojanx-9862538-0: FileHash-SHA256 f6b1e4c7c5d3e08828599fb7b268cac6444b3b750c0af81059d906b692a20ddd",
        "IDS Detections Samas Ransom CnC Beacon Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SN)",
        "Generickdz - Yara Detections: aPLib ,  PECompact_2xx , pecompact2 ,  PECompactv2xx ,  Delphi",
        "Generickdz - Yara Detections: PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,",
        "TrojanX Alerts: terminates_remote_process injection_rwx: modify_proxy infostealer_cookies recon_fingerprint",
        "TrojanX Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile antiav_detectreg createtool",
        "TrojanX Alerts: cape_extracted_content recon_fingerprint suricata_alert help32snapshot_module_enumeration",
        "TrojanX Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading ipc_namedpipe powershell_download",
        "Generickdz: https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
        "ALF:Ransom:Win32/Babax.SG!MTB - Yara Detections: MAL_Unknown_PWDumper_Apr18_3 ,  EnigmaProtector ,  Delphi",
        "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: procmem_yara injection_inter_process stack_pivot stealth_file antiav_detectfile",
        "ALF:Ransom:Win32/Babax.SG!MTB - Alerts: cape_extracted_content infostealer_cookies recon_fingerprint suricata_alert",
        "ALF:Ransom:Win32/Babax.SG!MTB: 34.241.182.209  Reverse DNS ec2-34-241-182-209.eu-west-1.compute.amazonaws.com | edge-irl1.demdex.net",
        "Razy-Yara Detections: SUSP_Imphash_Mar23_3 ,  UPX",
        "Yara Detections: ConventionEngine_Keyword_Bot ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
        "CDN 104.21.14.163-Associated: URL's: http://resources.mini-box.com/online/MBD-mini2440 NEC3.5 kit/mini2440-ARM9-Board-with-NEC3.5-kit-android.pdf",
        "CDN 104.21.14.163:-Associated: URL's: http://light.80371024.workers.dev/",
        "Microsoft Ignite: https://otx.alienvault.com/otxapi/indicators/file/screenshot/2a2607260abf7f5bf4dd121b4dc758e7106668bb974c9f5977bf665d46063b1f",
        "Merits further research: boot.net.anydesk.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Razy-9859339-0",
          "display_name": "Win.Malware.Razy-9859339-0",
          "target": null
        },
        {
          "id": "Win.Malware.Trojanx-9862538-0",
          "display_name": "Win.Malware.Trojanx-9862538-0",
          "target": null
        },
        {
          "id": "Win.Malware.Generickdz-9982080-0",
          "display_name": "Win.Malware.Generickdz-9982080-0",
          "target": null
        },
        {
          "id": "Win.Packed.Msilperseus-9956591-0",
          "display_name": "Win.Packed.Msilperseus-9956591-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:HackTool:Win32/DefenderControl",
          "display_name": "ALF:HeraklezEval:HackTool:Win32/DefenderControl",
          "target": null
        },
        {
          "id": "ALF:Ransom:Win32/Babax.SG!MTB",
          "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
          "target": null
        },
        {
          "id": "Samas-Samsam",
          "display_name": "Samas-Samsam",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1086",
          "name": "PowerShell",
          "display_name": "T1086 - PowerShell"
        }
      ],
      "industries": [
        "Finance",
        "Technology",
        "Telecommunications",
        "Cyber Security",
        "Civilian Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 757,
        "FileHash-SHA1": 664,
        "FileHash-SHA256": 665,
        "SSLCertFingerprint": 6,
        "domain": 120,
        "URL": 114,
        "hostname": 95,
        "email": 3
      },
      "indicator_count": 2424,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "562 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d89c45ddc0c7db084b75b7",
      "name": "Autodesk weakens CS | Unauthorized AlienVault API | Stolen pulsed",
      "description": "Critical issues within AlienVault , VT & my devices. Plugins auto installed after I opened  message from AV user. Sudden redirects to 0/ http/s.   Heavy modifications, removal of IoC's  on AV & VT  & Virus Total. Autodesk.com was under CrowdStrike  until last night. Links where vulnerabilities were originating from completely disappeared from graph I kindly kept private. Continuous mods for  months to Crowdstrike and other  pulses. [https://otx.alienvault.com/api appears in search] A page opens with Tag: \"esta caliente\" | All linked pulses Gone. Only person who frequently contacted me appears where they didn't before & These dishonest billion $ companies cover up though they are at fault for allowing ALL threat actor to be protected with  non adversarial businesses.  Besides other compromises, surprisingly Brashears porn found in Crowdstrike/Autodesk  others. Disappointing.",
      "modified": "2024-10-04T17:02:07.067000",
      "created": "2024-09-04T17:43:33.123000",
      "tags": [
        "healthy check",
        "ssl bypass",
        "domain tracker",
        "privacy badger",
        "startpage",
        "w11 pc",
        "pass",
        "iocs",
        "all scoreblue",
        "pdf report",
        "pcap",
        "stix",
        "avast avg",
        "no expiration",
        "status",
        "name servers",
        "moved",
        "h1 center",
        "next",
        "sec ch",
        "ch ua",
        "ua platform",
        "emails",
        "certificate",
        "passive dns",
        "urls",
        "encrypt",
        "body",
        "pe32 executable",
        "ms windows",
        "intel",
        "windows control",
        "panel item",
        "dos borland",
        "executable",
        "algorithm",
        "thumbprint",
        "serial number",
        "signing ca",
        "symantec time",
        "stamping",
        "g2 name",
        "g2 issuer",
        "class",
        "code",
        "kb pe",
        "csc corporate",
        "porkbun llc",
        "gandi sas",
        "request",
        "path",
        "get https",
        "get http",
        "response",
        "cachecontrol",
        "pragma",
        "connection",
        "gmt connection",
        "accept",
        "slug",
        "as29789",
        "united",
        "unknown",
        "ransom",
        "heur",
        "server",
        "registrar abuse",
        "san rafael",
        "autodesk",
        "contact phone",
        "registrar url",
        "process32nextw",
        "create c",
        "read c",
        "writeconsolew",
        "delete",
        "write",
        "show",
        "malware",
        "write c",
        "regsetvalueexa",
        "delete c",
        "search",
        "regdword",
        "whitelisted",
        "panda banker",
        "ursnif",
        "win32",
        "persistence",
        "execution",
        "banker",
        "local",
        "domain",
        "servers",
        "pulse pulses",
        "files",
        "ip address",
        "creation date",
        "united kingdom",
        "as9009 m247",
        "ipv4",
        "pulse submit",
        "url analysis",
        "twitter",
        "as16552 tiggee",
        "as397241",
        "as397240",
        "entries",
        "cname",
        "nxdomain",
        "a nxdomain",
        "worm",
        "file samples",
        "files matching",
        "alf features",
        "denver co",
        "wewatta",
        "scan endpoints",
        "related pulses",
        "date hash",
        "showing",
        "as62597 nsone",
        "date",
        "trojanspy",
        "cookie",
        "hostmaster",
        "expiration date",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tls handshake",
        "et info",
        "getdc0x2a",
        "failure",
        "post http",
        "copy",
        "crash",
        "ascii text",
        "ascii",
        "jpeg image",
        "artemis",
        "trojan",
        "virustotal",
        "mike",
        "vipre",
        "panda",
        "win32mediadrug",
        "win324shared",
        "win32spigot",
        "hstr",
        "lowfi",
        "yara detections",
        "contacted",
        "report spam",
        "mozilla",
        "trojanclicker",
        "url http",
        "url https",
        "role title",
        "added active",
        "type indicator",
        "source domain",
        "akamai rank",
        "hostname",
        "ver2",
        "msclkidn",
        "vids0",
        "global outage",
        "cobalt strike",
        "fancy bear",
        "communications",
        "android device",
        "cnc beacon",
        "suspicious ua",
        "youtube",
        "sakula rat",
        "mivast",
        "sakula",
        "windows",
        "samuel tulach",
        "light dark",
        "samuel",
        "tulach",
        "hyperv",
        "detecting",
        "writing gui",
        "bootkits",
        "world",
        "information",
        "discovery",
        "t1027",
        "t1057",
        "t1071",
        "protocol",
        "t1105",
        "tool transfer",
        "t1129",
        "capture",
        "service",
        "t1119"
      ],
      "references": [
        "autodesk.com [ Everything below was found in Autodesk [including crowdstrike & any.desk] Found in in Crowdsrike if labeled.",
        "66.254.114.234 | reflectededge.reflected.net | reflected.net | 192.0.2.0 | https://www.brazzers.com/ | brazzers.com  | brazzersnetwork.com",
        "keezmovies.com | redtube.com | tube8.com | tube8.com | youporn.com| 0.brazzers.com | www.g-tunnel.comwww.brazzers.com |",
        "Win32:Mystic ,  Win.Trojan.Xblocker-236 \u00bbFileHash-SHA256  8c59adbccc1987d13fec983f1e2be046611511b65479d1719bda77c5c90bbe21",
        "IDS Detections: TLS Handshake Failure | Alerts: network_icmp , injection",
        "Win32:BankerX-gen\\ [Trj] \u00bb FileHash-SHA256 2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c",
        "IDS Detections: Zeus Panda Banker / Ursnif Malicious SSL Certificate Detected TLS Handshake Failure",
        "Alerts: network_icmp antisandbox_idletime modifies_certificates modifies_proxy_wpad disables_proxy",
        "RedTube.com Detections: ALF:AGGR:OpcCl:95!ml , ALF:JASYP:Backdoor:Win32/Cycbot!atmn ,  Win.Downloader.117423-1 ,",
        "RedTube.com Detections: Win.Trojan.Crypt-321 ,  Win.Trojan.FakeAV-4166 ,  Win.Trojan.Fakeav-10977 ,  Win.Trojan.Fakeav-3386",
        "Crowdstrike: wildcard.352-445-1166.device.sim.to.img.sedoparking.com",
        "Crowdstrike: maxfehlinger.de http://auth.cranberry.testing.maxfehlinger.de | http://latex.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: https://traefik.cranberry.testing.maxfehlinger.de | http://traefik.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: http://watchtower.cranberry.testing.maxfehlinger.de| https://auth.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: auth.cranberry.testing.maxfehlinger.de | latex.cranberry.testing.maxfehlinger.de | traefik.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: watchtower.cranberry.testing.maxfehlinger.de | https://latex.cranberry.testing.maxfehlinger.de |",
        "Crowdstrike: https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing\t| https://www.anyxxxtube.net/sitemap.xml",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brash |",
        "Crowdstrike: autodesk.com | 0ds.autodesk.com | aknanalytics.autodesk.com | anubis.autodesk.com | autobetaint.autodesk.com",
        "Crowdstrike: autodeskarchitecture.autodesk.com | beacon-dev3.autodesk.com | boxtooffice365.autodesk.com | brahma-studio.autodesk.com",
        "Crowdstrike: cdc-stg-emea.autodesk.com | cloudcost.autodesk.com | cloudpc-stg.autodesk.com | d-s.autodesk.com |",
        "Crowdstrike: daiwahouse-learning.autodesk.com| datagovernance-dev.autodesk.com | enterprise-api-np.autodesk.com",
        "Crowdstrike: symcd.com [Certificate Subjectaltname \u00bb\u00bb anydesk.com \u00bb\u00bb http://gn.symcb.com/gn.crt Ocsp\thttp://gn.symcd.com] ANYDESK.COM-unsigned",
        "Crowdstrike: https://bat.bing.com/action/0?ti=12001672&tm=al001&Ver=2&mid=12436868-a484-4998-931c-980262982f67&sid=b92cd8f0483e11efa3c96fe28be413cb&vid=b92cdd10483e11efb1024309353d849f&vids=1&msclkid=N&pi=-740138922&lg=en-US&sw=800&sh=600&sc=24&tl=CrowdStrike%3A%20Stop%20breaches.%20Drive%20business.&p=https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2F&r=<=1022&pt=1721661968606",
        "Crowdstrike: \tbat.bing.com, https://tulach.cc, https://otx.alienvault.com/indicator/url/http://www.hallrender.com/attorney/brian-sabey",
        "Crowdstrike: https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | https://www.pornhub.com/video/search?search=tsara+brashears | www.youtube.com/watch?v=GyuMozsVyYs | www.pornhub.com | www.youtube.com",
        "Crowdstrike: https://hr.employmenthero.com/rs/387-SZZ-170/images/youtube-icon-emp-hero-violet.png",
        "Crowdstrike + Autodesk.com: hallrender.com/attorney/brian-sabey www.hallrender.com/attorney/brian-sabey hallrender.com www.hallrender.com https://hallrender.com milehighmedia.com https://www.milehighmedia.com/ https://www.milehighmedia.com/legal/2257",
        "Crowdstrike + Autodesk.com: brassiere.world mail.brassiere.world webdisk.brassiere.world webmail.brassiere.world",
        "Crowdstrike + Autodesk.com: 128 + symcd.com some w/issues | 658 autodesk.com pulse some w/issues | removed any.desk & boot",
        "The more I say...Any.Desk + boot.net.anydesk.com was in OG Private CrowdsStrike pulse",
        "Above links in search results direct out with and arrow pointing out.",
        "https://otx.alienvault.com/browse/global/pulses?q=tag:%22esta%20caliente%22&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=esta%20caliente",
        "Above link opened 'esta caliente'=   'it's hot'| I did NOT do that | All connected links gone. This has become common.",
        "I didn't add pertinent findings back to Pulse. Pulse comp,eyes says ago . Couldn't submit. It's was actually a tiny pulse of autodesk.com with crowdstrike relationship references,",
        "boot.net.anydesk.com removed from my Pulse below",
        "https://otx.alienvault.com/pulse/66d4c125ad61ee5577639a2d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "Win32:Mystic",
          "display_name": "Win32:Mystic",
          "target": null
        },
        {
          "id": "Win.Trojan.Xblocker-236",
          "display_name": "Win.Trojan.Xblocker-236",
          "target": null
        },
        {
          "id": "Ransom:Win32/Genasom",
          "display_name": "Ransom:Win32/Genasom",
          "target": "/malware/Ransom:Win32/Genasom"
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:JASYP:Backdoor:Win32/Cycbot",
          "display_name": "ALF:JASYP:Backdoor:Win32/Cycbot",
          "target": null
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Usteal",
          "display_name": "TrojanSpy:Win32/Usteal",
          "target": "/malware/TrojanSpy:Win32/Usteal"
        },
        {
          "id": "Win.Trojan.PoetRat-7669676-0",
          "display_name": "Win.Trojan.PoetRat-7669676-0",
          "target": null
        },
        {
          "id": "Mivast",
          "display_name": "Mivast",
          "target": null
        },
        {
          "id": "Sakula",
          "display_name": "Sakula",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1417,
        "FileHash-SHA1": 1165,
        "FileHash-SHA256": 6536,
        "URL": 6112,
        "domain": 1340,
        "hostname": 2654,
        "email": 15,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 19248,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "562 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d4c125ad61ee5577639a2d",
      "name": "AnyDesk Backdoor: Ongoing",
      "description": "Part of a much larger problem...Pulse has a relationship to one of the largest data breaches in our time.",
      "modified": "2024-09-01T19:31:49.180000",
      "created": "2024-09-01T19:31:49.180000",
      "tags": [
        "click",
        "contact",
        "remote desktop",
        "address book",
        "anydesk",
        "case studies",
        "help center",
        "contact us",
        "secure all",
        "loading captcha",
        "guard",
        "scoreblue",
        "gmbh",
        "cnanynet relay",
        "cnanynet root",
        "bot",
        "yara",
        "ids",
        "service",
        "powershell",
        "tunneling",
        "injection",
        "software",
        "social engineering",
        "anydesk",
        "remote access",
        "phishing",
        "uk banks",
        "germany"
      ],
      "references": [
        "https://anydesk.com/en/downloads/thank-you?dv=win_exe",
        "Sourced by ATOAlienVault: FileHash-SHA256\t746475f67cd3456551c5cd9c6205c9754b2aef17472af1b40d41904df2337a2b",
        "Yara Detections: ConventionEngine_Keyword_Bot",
        "ConventionEngine_Keyword_Bot bot BoT Bot bOt RSDS_T~!F,ah\u0001C:\\Buildbot\\ad-windows-32\\build\\release\\app-32\\win_loader\\AnyDesk.pdb",
        "High Priority Alerts: antivm_generic_disk registry_credential_store_access recon_fingerprint removes_zoneid_ads",
        "IP: 195.181.174.174\tboot.net.anydesk.com \u00bb\u00bb Reverse IP lookup: boot.net.anydesk.com | Germany\tAS60068 datacamp limited",
        "Origins found in CrowdStrike, Pega Systems, MIT and Bitdefender by Scoreblue & OctoSeek: watchtower.cranberry.testing.maxfehlinger.de"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [
        "Finance",
        "Technology",
        "Telecommunications",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1,
        "hostname": 8,
        "domain": 2,
        "URL": 14,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 26,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "595 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6681f6f2cd37f508d362c2db",
      "name": "PegaSystems | Apple iOS iPad | Malicious | Tracking",
      "description": "",
      "modified": "2024-07-01T00:23:14.084000",
      "created": "2024-07-01T00:23:14.084000",
      "tags": [
        "united",
        "passive dns",
        "as14449",
        "moved",
        "urls",
        "authority",
        "body",
        "object",
        "certificate",
        "scan endpoints",
        "unknown",
        "date",
        "as11377",
        "as16552 tiggee",
        "as174 cogent",
        "ireland unknown",
        "cname",
        "as11404 wave",
        "all scoreblue",
        "pulse pulses",
        "entries",
        "ipv4",
        "pulse submit",
        "url analysis",
        "dynamicloader",
        "port",
        "destination",
        "high",
        "medium",
        "windows",
        "cmd c",
        "default",
        "document file",
        "v2 document",
        "write",
        "copy",
        "name verdict",
        "falcon sandbox",
        "sha1",
        "sha256",
        "misc attack",
        "mitre att",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "ascii text",
        "hybrid",
        "starfield",
        "click",
        "strings",
        "core",
        "contact",
        "as396982 google",
        "historical ssl",
        "referrer",
        "co20230203",
        "malware",
        "discord",
        "credential",
        "lunar client",
        "trendmicro av",
        "neural netw",
        "upscayl",
        "steam game",
        "server",
        "domain status",
        "registrar abuse",
        "google",
        "community",
        "record type",
        "ttl value",
        "data",
        "v3 serial",
        "number"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "664fceb9e0acfc0baee851c2",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 75,
        "URL": 3584,
        "domain": 836,
        "hostname": 1749,
        "FileHash-SHA256": 726,
        "FileHash-MD5": 88,
        "SSLCertFingerprint": 9,
        "email": 1
      },
      "indicator_count": 7068,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "658 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "664fceb9e0acfc0baee851c2",
      "name": "PegaSystems | Apple iOS iPad | Malicious | Tracking",
      "description": "Tags, findings of this report is auto generated by Level Blue OTX.AlienVault.\nPer my research: \nMalicious Score: 10/10\nAlerts: Alerts\nransomware_file_modifications, script_created_process, stealth_network, infostealer_cookies, suspicious_command_tools,\ndynamic_function_loading, reads_self,\nstealth_window, cmdline_http_link, uses_windows_utilities, antidebug_setunhandledexceptionfilter, cmdline_terminate, stealth_timeout,\n\nAffected Device: Apples iOS Ipad, Update 17.5.1\npegasystems.voicestorm.com -Cisco Umbrella {permanently moved as of 5.23.2024} found in Apple link - http://apps.apple.com/app/, nsis, downloaders,injection, data local, remotewd devices, tracking,",
      "modified": "2024-06-22T23:05:37.577000",
      "created": "2024-05-23T23:18:17.563000",
      "tags": [
        "united",
        "passive dns",
        "as14449",
        "moved",
        "urls",
        "authority",
        "body",
        "object",
        "certificate",
        "scan endpoints",
        "unknown",
        "date",
        "as11377",
        "as16552 tiggee",
        "as174 cogent",
        "ireland unknown",
        "cname",
        "as11404 wave",
        "all scoreblue",
        "pulse pulses",
        "entries",
        "ipv4",
        "pulse submit",
        "url analysis",
        "dynamicloader",
        "port",
        "destination",
        "high",
        "medium",
        "windows",
        "cmd c",
        "default",
        "document file",
        "v2 document",
        "write",
        "copy",
        "name verdict",
        "falcon sandbox",
        "sha1",
        "sha256",
        "misc attack",
        "mitre att",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "ascii text",
        "hybrid",
        "starfield",
        "click",
        "strings",
        "core",
        "contact",
        "as396982 google",
        "historical ssl",
        "referrer",
        "co20230203",
        "malware",
        "discord",
        "credential",
        "lunar client",
        "trendmicro av",
        "neural netw",
        "upscayl",
        "steam game",
        "server",
        "domain status",
        "registrar abuse",
        "google",
        "community",
        "record type",
        "ttl value",
        "data",
        "v3 serial",
        "number"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 75,
        "URL": 3584,
        "domain": 836,
        "hostname": 1749,
        "FileHash-SHA256": 726,
        "FileHash-MD5": 88,
        "SSLCertFingerprint": 9,
        "email": 1
      },
      "indicator_count": 7068,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "666 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://auth.cranberry.testing.maxfehlinger.de",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://auth.cranberry.testing.maxfehlinger.de",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776645633.7047698
}