{
  "type": "URL",
  "indicator": "https://bitechnologies.ng",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://bitechnologies.ng",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3920454931,
      "indicator": "https://bitechnologies.ng",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "69544c73467a9c3858556698",
          "name": "Mira Malware Drive By Compromise Google.com search engine  | Microsoft | Apple",
          "description": "Microsoft Mira Malware Drive By Compromise Google.com.\n Device infected with MyDoom zombie maker. \nEstablished user location, screen captures, corrupted Apple device via Google search engine browser redirect. Attack began 12.30.2025 past midnight. Threat actor powered on cameras, microphones, and preformed their hacker intentions. #stateofcolorado",
          "modified": "2026-01-29T21:02:54.448000",
          "created": "2025-12-30T22:04:35.565000",
          "tags": [
            "content",
            "kb body",
            "p3p cp",
            "date tue",
            "gmt server",
            "html info",
            "12.30.2025",
            "urls",
            "url add",
            "http",
            "ip address",
            "related nids",
            "files location",
            "united",
            "flag united",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "assigned pa",
            "status",
            "whois server",
            "ripe ncc",
            "ripe network",
            "abuse contact",
            "orgid",
            "address",
            "orgabuseref",
            "postalcode",
            "ripe",
            "email",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "found",
            "ssl certificate",
            "execution",
            "google llc",
            "ascii text",
            "mitre att",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "data upload",
            "extraction",
            "ta0004",
            "evasion ta0005",
            "injection t1055",
            "t1055",
            "col ta0011",
            "l t1071",
            "encrypted ch",
            "t1573",
            "present nov",
            "present oct",
            "certificate",
            "present dec",
            "aaaa",
            "search",
            "servers",
            "record value",
            "emails",
            "title",
            "leveidiuelabs",
            "include",
            "review",
            "exclude data",
            "suggested ogs",
            "find s",
            "command decode",
            "development att",
            "initial access",
            "t1189 driveby",
            "html",
            "execution att",
            "href",
            "size",
            "pattern match",
            "filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "malware",
            "trojan",
            "mira malware",
            "push",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "yara rule",
            "program",
            "runtime error",
            "medium",
            "python",
            "win64",
            "unknown",
            "guard",
            "accept",
            "write",
            "launcher",
            "updater",
            "smartassembly",
            "delphi",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "copy",
            "next",
            "mydoom checkin",
            "win32mydoom dec",
            "name servers",
            "creation date",
            "passive dns",
            "domain",
            "expiration date",
            "hostname",
            "date",
            "google chrome",
            "screen capture",
            "locate human",
            "target",
            "black hat",
            "apple",
            "microsoft",
            "google",
            "stateofcolorado",
            "christopher ahmann",
            "brian sabey"
          ],
          "references": [
            "Google.com sorry not sorry index | https://www.google.com/search",
            "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
            "redirector.gvt1.com",
            "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
            "microsoft-falcon.net",
            "hattchett.ddns.net",
            "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
            "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
            "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
            "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
            "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
            "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
            "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
            "Yara Detections SUSP_Imphash_Mar23_2",
            "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
            "userlocation-prod.ingress.kors.microsoft-falcon.net ->",
            "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
            "To get future Google Chrome updates, you'll need"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Mira",
              "display_name": "Trojan:Win32/Mira",
              "target": "/malware/Trojan:Win32/Mira"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Mydoom Checkin",
              "display_name": "Mydoom Checkin",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1048.001",
              "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
              "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1939,
            "hostname": 1205,
            "URL": 3310,
            "domain": 432,
            "FileHash-MD5": 396,
            "CIDR": 3,
            "email": 16,
            "FileHash-SHA1": 373,
            "SSLCertFingerprint": 13,
            "CVE": 1
          },
          "indicator_count": 7688,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "79 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6951f52a5af00a9be445ad41",
          "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
          "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
          "modified": "2026-01-28T02:03:16.337000",
          "created": "2025-12-29T03:27:38.183000",
          "tags": [
            "no expiration",
            "expiration",
            "url http",
            "url https",
            "iocs",
            "enter source",
            "url or",
            "name servers",
            "a domains",
            "accept encoding",
            "urls",
            "emails",
            "servers",
            "url add",
            "http",
            "files domain",
            "files related",
            "related tags",
            "united",
            "gmt contenttype",
            "ipv4 add",
            "url analysis",
            "files",
            "present dec",
            "cname",
            "virtool",
            "cryp",
            "ip address",
            "trojan",
            "win32",
            "therahand",
            "jeffrey reimer",
            "reimer  dpt",
            "msie",
            "chrome",
            "unknown ns",
            "unknown cname",
            "record value",
            "accept",
            "encrypt",
            "passive dns",
            "moved",
            "wp engine",
            "meta",
            "wordpress",
            "pegasus",
            "america flag",
            "america asn",
            "reverse dns",
            "flag",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "analysis",
            "tor analysis",
            "dns requests",
            "united states",
            "hostname",
            "pulse submit",
            "domain",
            "files ip",
            "eva lisa",
            "eva reimer",
            "all ipv4",
            "dynamic_content",
            "fingerprinting",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "status",
            "hostname add",
            "evasion",
            "proximity",
            "pulse pulses",
            "address",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "command",
            "initial access",
            "spawns",
            "present mar",
            "present jun",
            "title",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "data recovery",
            "ms windows",
            "process32nextw",
            "intel",
            "pe32",
            "format",
            "mozilla",
            "installcapital",
            "generic",
            "write",
            "unknown",
            "malware",
            "next",
            "installer",
            "template",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "script script",
            "pragma",
            "port",
            "destination",
            "binbusybox",
            "high",
            "post",
            "icmp traffic",
            "dns query",
            "newstatusurl",
            "mirai",
            "prefetch8",
            "ck matrix",
            "localappdata",
            "info",
            "ssl certificate",
            "czech republic",
            "prefetch1",
            "prefetch2",
            "israel israel",
            "analysis tip",
            "href",
            "ascii text",
            "null",
            "refresh",
            "span",
            "iframe",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "beginstring",
            "windir",
            "openurl c",
            "programfiles",
            "related nids",
            "files location",
            "flag united",
            "dynamicloader",
            "medium",
            "named pipe",
            "win64",
            "download",
            "delphi",
            "smartassembly",
            "m. brian sabey",
            "quasi government",
            "no such agency",
            "facebook",
            "search",
            "date",
            "showing",
            "ukraine",
            "\u2018buzz\u2019",
            "alex karp",
            "peter theil",
            "elon musk",
            "ff d5",
            "yara rule",
            "ee fc",
            "generic http",
            "exe upload",
            "f0 ff",
            "eb e1",
            "ff bb",
            "show process",
            "sha1",
            "sub domain",
            "show technique",
            "network traffic",
            "class",
            "starfield",
            "cyber crime",
            "yara detections",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "sha256 add",
            "av detections",
            "ids detections",
            "alerts",
            "show",
            "dock",
            "execution",
            "present feb",
            "value",
            "content type",
            "mirai",
            "sha256",
            "body",
            "gmt content",
            "ddos",
            "mtb sep",
            "hosting",
            "domain robot",
            "expiration date",
            "welcome",
            "apple",
            "christopher p. ahmann",
            "tsara",
            "monitored target",
            "github https",
            "github",
            "smart assembly",
            "red hat",
            "hackers",
            "google"
          ],
          "references": [
            "https://therahand.com",
            "www.socialimages.reputationdatabase.com",
            "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
            "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
            "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
            "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
            "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
            "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "BinBusyBox: 0x.un5t48l3.host",
            "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
            "AS24961 MyLoc Managed IT AG",
            "PSI | Planned Systems International https://www.plan-sys.com/cyber",
            "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
            "https://www.red-gate.com/products/smartassembly",
            "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
            "Colorado maintains a public-facing police misconduct database via the state's",
            "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
            "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
          ],
          "public": 1,
          "adversary": "NSO Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-306281",
              "display_name": "Win.Trojan.Agent-306281",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.KI",
              "display_name": "VirTool:Win32/Obfuscator.KI",
              "target": "/malware/VirTool:Win32/Obfuscator.KI"
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "ELF:Gafgyt-DZ\\ [Trj]",
              "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-5607483-0",
              "display_name": "Unix.Trojan.Mirai-5607483-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1036.005",
              "name": "Match Legitimate Name or Location",
              "display_name": "T1036.005 - Match Legitimate Name or Location"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 523,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 2165,
            "URL": 4953,
            "domain": 1118,
            "hostname": 1951,
            "email": 12,
            "SSLCertFingerprint": 52,
            "CVE": 2
          },
          "indicator_count": 11178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "81 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692d02f096f3ec8b5b507496",
          "name": "Google Drive: Share Files Online with Secure Cloud Storage | Google Workspace",
          "description": "nJRAT | Corrupted Google Drive sent to targets former device. Years long social engineering may have been involved. All\nIoC\u2019s Appears to involve years of social engineering. Google\ndrive service in question is a storage service based in Vietnam. | \n\nBotnet / Check-ins / Spyware / Cams. [Anon Sec Botnet subdomain name pulsed.  Close directly related to zalo.me\nand tbtteams.com]\nRequires further research.\n\nThis pulse is a bit confusing due where and who it originated from.",
          "modified": "2025-12-31T02:01:50.101000",
          "created": "2025-12-01T02:52:32.483000",
          "tags": [
            "business",
            "enterprise",
            "drive",
            "english",
            "google drive",
            "try drive",
            "business small",
            "workspace",
            "sign",
            "strong",
            "find",
            "life",
            "tools",
            "protect",
            "cloud",
            "simple",
            "android",
            "indonesia",
            "video",
            "mb download",
            "shared may",
            "shared",
            "learn",
            "drive drive",
            "name date",
            "javascript",
            "dynamicloader",
            "medium",
            "minimal headers",
            "high",
            "observed get",
            "get http",
            "united",
            "yara rule",
            "http",
            "write",
            "guard",
            "malware",
            "read c",
            "ms windows",
            "intel",
            "png image",
            "rgba",
            "pe32",
            "get na",
            "explorer",
            "music",
            "virlock",
            "media",
            "ho chi",
            "minh city",
            "viet nam",
            "storage company",
            "limited",
            "google",
            "address as",
            "luutruso",
            "cloudflar",
            "domain",
            "asn15169",
            "asn56153",
            "asn13335",
            "cisco",
            "umbrella rank",
            "apex domain",
            "url https",
            "kb stylesheet",
            "kb font",
            "kb image",
            "image",
            "kb script",
            "november",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "redirect chain",
            "kb document",
            "urls",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "t1590 gather",
            "windir",
            "openurl c",
            "prefetch2",
            "tor analysis",
            "dns requests",
            "domain address",
            "rsdsq jfu",
            "ollydbg ollydbg",
            "wireshark",
            "external",
            "binary file",
            "mitre att",
            "ck matrix",
            "aaaa",
            "cong ty",
            "co phan",
            "code",
            "province hcm",
            "files",
            "ip address",
            "request",
            "flag",
            "country",
            "contacted hosts",
            "process details",
            "link initial",
            "t1480 execution",
            "domains",
            "moved",
            "gmt content",
            "all ipv4",
            "url analysis",
            "location viet",
            "title",
            "error",
            "problem",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "development att",
            "name server",
            "markmonitor",
            "localappdata",
            "programfiles",
            "edge",
            "hyundai",
            "social engineering",
            ".mil",
            "hackers",
            "phishing eml",
            "summary",
            "cisco umbrella",
            "google safe",
            "browsing",
            "current dns",
            "a record",
            "ip information",
            "ipasns ip",
            "detail domain",
            "domain tree",
            "links apex",
            "transfer",
            "b script",
            "b stylesheet",
            "frame b830",
            "b document",
            "value",
            "december",
            "degurafregistry",
            "gat object",
            "jsl object",
            "gapijstiming",
            "iframe function",
            "domainpath name",
            "nid value",
            "source level",
            "files domain",
            "files related",
            "tags",
            "related tags",
            "virustotal",
            "foundry",
            "pulse otx",
            "dark",
            "vietnam",
            "present aug",
            "present nov",
            "present jul",
            "present sep",
            "unknown aaaa",
            "search",
            "name servers",
            "present oct",
            "trojan",
            "data upload",
            "extraction",
            "se https",
            "include review",
            "exclude sugges",
            "find s",
            "failed",
            "typ don",
            "faith",
            "study",
            "romeo\u2019s",
            "juliettes",
            "femme fatales",
            "strategy",
            "honey pot",
            "honey traps",
            "spy",
            "helix",
            "anons",
            "passive dns",
            "pulse pulses",
            "files ip",
            "address",
            "location united",
            "asn as400519",
            "whois registrar",
            "ms defender",
            "files matching",
            "number",
            "sample analysis",
            "hide samples",
            "date hash",
            "cameras",
            "cams",
            "spycam",
            "botnet",
            "vietnam",
            "company limited",
            "dnssec",
            "status",
            "india unknown",
            "present may",
            "espionage",
            "hostname add",
            "generic",
            "cnc activity",
            "backdoor",
            "ipv4",
            "anonsecbotnet",
            "iptv"
          ],
          "references": [
            "drive.google.com/",
            "https://foundry2-lbl.dvr.dn2.n-helix.com/",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/c7aa2b182b17cfb5efb3367e0bc7b36e7088ab43a8fb21a772a0f8f90b7329d9",
            "zalo.me | href | Binary File | ATT&CK ID T1566.002",
            "https://account.helix.com/activate/start",
            "anonsecbotnet.cameraddns.net \u2022 cameraddns.net \u2022 http://iptv.cameraddns.net/cotich/ \u2022 http://iptv.cameraddns.net/cotichC \u2022",
            "https://iptv.cameraddns.net/kodi/zips/plugin.video.iptvjson]",
            "Terse Unencrypted Request for Google - Likely Connectivity Check",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/c7aa2b182b17cfb5efb3367e0bc7b36e7088ab43a8fb21a772a0f8f90b7329d9",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/d334c3220573f98da1a0eef13be9c8b0053447519b3a6ace3728bcffa10b99b6",
            "cpcalendars.hyundaibariavungtau3s.com \u2022 cpcontacts.hyundaibariavungtau3s.com",
            "https://hyundaibariavungtau3s.com/vehicle/stargazer",
            "https://hyundaibariavungtau3s.com/vehicle/ioniq-5",
            "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-venue",
            "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-palisade",
            "https://hyundaibariavungtau3s.com/vehicle/hyundai-custin",
            "https://hyundaibariavungtau3s.com/wp-content/themes/flatsome/inc/extensions/flatsome-live-search/",
            "https://delivery-mp-microsoft.dvrx.dn3.n-helix.com \u2022 https://dnsplay.dn2.n-helix.com",
            "https://dnss2.dn2.n-helix.com \u2022 https://dnssounib.dn2.n-helix.com/",
            "https://foundry2-lbl.dvr.dn2.n-helix.com/ \u2022 https://node8-serve.dvrx.dn3.n-helix.com \u2022 https://sfbambi-tel.dn2.n-helix.com \u2022 https://softlayer3.dn2.n-helix.com",
            "http://bjdclub.ru/out.phtml?www.skyxxxgals.info/feet-licking-porn/",
            "http://www.yayabay.com/forum/adclick.php?url=http%3a%2f%2fhkprice.info%2fpornstars%2f22466",
            "https://asianleak.com/videos/8120/sg-cousin-showering-spy-cam",
            "feedback-pa.clients6.google.com/v1/survey/trigger/",
            "https://feedback-pa.clients6.google.com/v1/survey/trigger/trigger_anonymous?key=AIzaSyD3LJeW4Q6gtdgJlyeFZUp-GhpIoc6EUeg",
            "anonsecbotnet.cameraddns.net \u2022 http://anonsecbotnet.cameraddns.net \u2022 https://anonsecbotnet.cameraddns.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Virus.Virlock-6804475-0",
              "display_name": "Win.Virus.Virlock-6804475-0",
              "target": null
            },
            {
              "id": "Win.Malware.Bzub-6727003-0",
              "display_name": "Win.Malware.Bzub-6727003-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9801687-0",
              "display_name": "Win.Trojan.Generic-9801687-0",
              "target": null
            },
            {
              "id": "NID",
              "display_name": "NID",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Dropper.njRAT-10015886-0",
              "display_name": "Win.Dropper.njRAT-10015886-0",
              "target": null
            },
            {
              "id": "Win.Packed.Generic-9795615-0",
              "display_name": "Win.Packed.Generic-9795615-0",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi.AJ GC!",
              "display_name": "Backdoor:MSIL/Bladabindi.AJ GC!",
              "target": "/malware/Backdoor:MSIL/Bladabindi.AJ GC!"
            },
            {
              "id": "Win.Packed.Generic-9795615-0\t.",
              "display_name": "Win.Packed.Generic-9795615-0\t.",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi.AJ",
              "display_name": "Backdoor:MSIL/Bladabindi.AJ",
              "target": "/malware/Backdoor:MSIL/Bladabindi.AJ"
            },
            {
              "id": "Win.Packed.Fecn-7077459-0",
              "display_name": "Win.Packed.Fecn-7077459-0",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Ranos.A",
              "display_name": "Trojan:MSIL/Ranos.A",
              "target": "/malware/Trojan:MSIL/Ranos.A"
            },
            {
              "id": "Win.Trojan.Generic-6417450-0",
              "display_name": "Win.Trojan.Generic-6417450-0",
              "target": null
            },
            {
              "id": "ALF:Backdoor:MSIL/Noancooe.KA",
              "display_name": "ALF:Backdoor:MSIL/Noancooe.KA",
              "target": null
            },
            {
              "id": "Win.Packed.Msilperseus-9956592-0",
              "display_name": "Win.Packed.Msilperseus-9956592-0",
              "target": null
            },
            {
              "id": "Trojan:MSIL/ClipBanker",
              "display_name": "Trojan:MSIL/ClipBanker",
              "target": "/malware/Trojan:MSIL/ClipBanker"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1194",
              "name": "Spearphishing via Service",
              "display_name": "T1194 - Spearphishing via Service"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1039",
              "name": "Data from Network Shared Drive",
              "display_name": "T1039 - Data from Network Shared Drive"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1567.002",
              "name": "Exfiltration to Cloud Storage",
              "display_name": "T1567.002 - Exfiltration to Cloud Storage"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1911,
            "hostname": 714,
            "FileHash-SHA256": 1304,
            "FileHash-MD5": 159,
            "FileHash-SHA1": 71,
            "SSLCertFingerprint": 2,
            "domain": 421,
            "CVE": 1,
            "email": 4
          },
          "indicator_count": 4587,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "109 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6692440efac39f5213329f13",
          "name": "Mustang Panda: Oxypumper | Ransom Suspicious verifier SpyTox",
          "description": "Mustang Panda is an alleged;China-based' non-governmental cyber espionage threat actor that was first observed in 2017. Targeting non-governmental civilians. Likely target is in many bot networks. Potential HoneyPot, this tool makes itself visible to target when researching the validity of an email or phone number. Notable for Gand Crane ransomware text embedded in SpyTox page image. Injection process observed. Affects most types of devices including iOS and Android. Critical issues found. IP's registrar's, domains 'not' contacted.\n\nHackers, harassment, cybercrime, cyber espionage.",
          "modified": "2024-08-12T08:04:00.041000",
          "created": "2024-07-13T09:08:30.431000",
          "tags": [
            "historical ssl",
            "referrer",
            "june",
            "october",
            "july",
            "hacker",
            "pe resource",
            "mustang panda",
            "plugx",
            "cryptbot",
            "threat roundup",
            "december",
            "process32nextw",
            "regsetvalueexa",
            "x00x00",
            "regdword",
            "memcommit",
            "high",
            "regbinary",
            "okrnserver",
            "regsetvalueexw",
            "download",
            "copy",
            "as15169 google",
            "united",
            "aaaa",
            "unknown",
            "gmt path",
            "passive dns",
            "search",
            "cname",
            "showing",
            "cookie",
            "ascii text",
            "pattern match",
            "error",
            "null",
            "typeerror",
            "sha1",
            "mitre att",
            "et tor",
            "known tor",
            "date",
            "infinity",
            "onload",
            "trident",
            "android",
            "void",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "generator",
            "third-party-cookies",
            "text/html",
            "trackers",
            "external-resources",
            "iframes",
            "entries",
            "status",
            "name servers",
            "urls",
            "next",
            "nxdomain",
            "susp",
            "a nxdomain",
            "domain",
            "win32",
            "as62597",
            "france unknown",
            "for privacy",
            "moved",
            "a domains",
            "meta",
            "gmt cache",
            "trojan",
            "creation date",
            "record value",
            "script urls",
            "as55293 a2",
            "as44273 host",
            "canada unknown",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "files",
            "ip address",
            "location canada",
            "443 ma2592000",
            "code",
            "trojanspy",
            "type",
            "ipv4",
            "twitter",
            "trojandropper",
            "find",
            "form",
            "less see",
            "formbook cnc",
            "checkin",
            "a li",
            "li ul",
            "cycbot",
            "emails",
            "as20940",
            "as54113",
            "asnone denmark",
            "worm",
            "asnone",
            "as4230 claro",
            "refloadapihash",
            "salicode",
            "div div",
            "wi fi",
            "orion wi",
            "orion",
            "a div",
            "div section",
            "orion logo",
            "target",
            "fast",
            "contact",
            "open",
            "virtool",
            "content type",
            "found",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ubuntu",
            "accept",
            "keepalive",
            "site",
            "find people",
            "numbers",
            "sptox",
            "utc google",
            "html info",
            "title spytox",
            "emails meta",
            "tags viewport",
            "spytox og",
            "type win32",
            "exe size",
            "mb first",
            "seen",
            "file name",
            "avg win32",
            "fortinet",
            "double click",
            "solutions",
            "domains",
            "sneaky server",
            "replacement",
            "unauthorized",
            "malware http",
            "core",
            "sim unlock",
            "emotet",
            "ta569",
            "critical",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 protector",
            "confuser",
            "confuserex",
            "checker",
            "samplename",
            "bonusbitcoin",
            "xslayer",
            "samplepath",
            "names",
            "details",
            "header intel",
            "name md5",
            "language",
            "contained",
            "rticon neutral",
            "ico rtgroupicon",
            "neutral",
            "assembly common",
            "clr version",
            "assembly name",
            "metadata header",
            "entry point",
            "rva entry",
            "strong name",
            "streams size",
            "entropy chi2",
            "ip detections",
            "country",
            "executable",
            "info header",
            "allmul vbaget4",
            "adjfprem ord",
            "data rtversion",
            "generic",
            "file type",
            "win32 exe",
            "kb file",
            "graph",
            "user",
            "windir",
            "downloads",
            "written c",
            "files deleted",
            "dropped c",
            "process",
            "logistics",
            "cyber defense",
            "brazzers",
            "tsara brashears",
            "gpt analyzer",
            "apple private",
            "data collection",
            "twitter andor",
            "snatch",
            "ransomware",
            "default",
            "rticon english",
            "type name",
            "data",
            "getfilesize",
            "getdc copyimage",
            "rticon russian",
            "pe32 executable",
            "borland delphi",
            "delphi generic",
            "dos borland",
            "hkcuclsid",
            "registry keys",
            "hkcrclsid",
            "file system",
            "settings c",
            "files c",
            "shared c",
            "sharedink c",
            "hostname",
            "as29791",
            "as8426 claranet",
            "malware",
            "network",
            "apple ios",
            "apple",
            "tmobile metro",
            "apeaksoft ios",
            "spybanker",
            "remcos",
            "adwind",
            "njrat",
            "guloader",
            "banload",
            "asyncrat",
            "arkeistealer",
            "danabot",
            "nordvpnsetup",
            "kb graph",
            "summary",
            "sharedinkarsa c",
            "sharedinkbgbg c",
            "sharedinkcscz c",
            "sharedinkdadk c",
            "gmt etag",
            "x amz",
            "body",
            "body html",
            "bq jul",
            "et trojan",
            "v4inhxvlhx0",
            "medium",
            "memreserve",
            "checks amount",
            "t1082",
            "module load",
            "e weowe64e",
            "edelepexe",
            "e rev",
            "weinedoewse net",
            "ransom",
            "show",
            "filehash",
            "related",
            "reverse dns",
            "haut",
            "servers",
            "pulse submit",
            "as3215 orange",
            "france",
            "backdoor",
            "paris",
            "honeypot",
            "python",
            "callback phishing",
            "teams",
            "porn related",
            "harassment"
          ],
          "references": [
            "https://www.spytox.com/ | Malicious Phone number & eMail verifier. HoneyPotNetBot?",
            "Alerts: disables_security network_icmp modifies_certificates modifies_proxy_wpad multiple_useragents injection_resumethread",
            "Antivirus Detections: Win.Malware.Oxypumper-6900445-0",
            "IDS Detections: Win32/QwertMiner CoinMiner Dropper CnC Checkin M2 | IDS Detections: Terse Named Filename EXE Download - Possibly Hostile",
            "IDS Detections: HTTP Executable Download from suspicious domain with direct request/fake browser (multiple families)",
            "IDS Detections: DNS Query for Suspicious .ml Domain | DNS Query for Suspicious .ga Domain | Domain External IP Lookup ip-api.com | Win32/QwertMiner Suspicious UA (jdlnb)",
            "Win.Malware.Oxypumper-6900445-0: FileHash-SHA1  05e520126ee1100c98263bfbd5a6ff0ce6ace4f7",
            "Win.Malware.Oxypumper-6900445-0: FileHash-MD5 2d84a619d4bd339f860cb48af0c9b6c8",
            "Win.Malware.Oxypumper-6900445-0: FileHash-SHA 256365ffde7df914840eb21c96f34c39912a4b031e3814b8e902b67acee6dff65a1",
            "Interesting: https://otx.alienvault.com/indicator/url/http://google.com.ge/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCoQFjAA&url=http%3A%2F%2Ft1t.us%2F&ei=9H0XU4rwPKXOygP_8IL4Bw&usg=AFQjCNEgQ29Mke-UahuBZ5wqWav04lFYvA&sig2=9-57Skjm2Hu4tg-e8iysQA&bvm=bv.62286460,d.bGQ",
            "google.com.ge , google.kiteflier.top, google.pf, google.com.ht, http://philsinstallation.com/, www.orion.area120.com ?, https://degoogle.xyz/feed/",
            "https://hybrid-analysis.com/sample/89fb2bccca6342d8fe50bd8b9763a6c829fd1bfe4fe2eccb251bd7e060f0d168/6691b5695751a70ec9041622",
            "Ransomware Detected: text artifact in screenshot indicates file may be ransomware details \"Antivirus\" (Source: screen_11.png, Indicator: \"virus\")",
            "scanning_hosts:  138.197.217.6,  IPv4 142.251.18.103, IPv4 142.251.31.99",
            "Backdoor:Win32/Plugx: FileHash-SHA256 a3ff97a0d338fd47e0af6822c4ee762491fc39028af984fe7ff8a1b6948fafe9",
            "Backdoor:Win32/Plugx: FileHash-MD5 63ebfbad26a529929927b9b485faa18a",
            "Antivirus Detections: Win32:TrojanX-gen\\ [Trj] , Win.Malware.Generickdz-6914893-0, Backdoor:Win32/Plugx",
            "Yara Detections: SUSP_NET_NAME_ConfuserEx , Delphi Alerts: network_icmp",
            "iPhone: 8.0.1.iphone.com.nextradiotv.bfmtv.adsenseformobileapps.com",
            "iPhone: 5.100.3.iphone.com.tranzmate.tranzmate1.adsenseformobileapps.com",
            "iPhone: 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com",
            "iPhone: 1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com",
            "iOS: http://www.au-petit-cafe-hollywood.com/guestbook/index.php?_sm_byp=iVVJNj4pQQp0ZsWB%3Eshowbox%20install%20iphone%3C/a%3E",
            "Interesting: www1.xxx.ddns.info | https://sgpelvicfloor.in/wp-admin/ZDCpqfZDmM5x9MxAaxxX/",
            "DotNET_Crypto_Obfuscator",
            "Antivirus Detections: ALF:HSTR:Adware:Win32/iBryte!bit ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47 ,  PWS:Win32/QQpass.B!MTB ,",
            "Antivirus Detections: Trojan:Win32/Bulta!rfn ,  TrojanDownloader:Win32/Cutwail ,  TrojanDropper:Win32/Loring ,  TrojanSpy:Win32/Nivdort.CB ,",
            "Antivirus Detections: TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA ,  TrojanSpy:Win32/Nivdort.DB ... ,  TrojanSpy:Win32/Nivdort.CB ,  TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA",
            "IDS Detections: Adware.iBryte.Z Checkin W32/iBryte.Adware Installer Download, Kazy/Kryptor/Cycbot Trojan Checkin 2,",
            "IDS Detections: FormBook CnC Checkin (GET) W32/iBryte.Adware Affiliate Campaign Executable Download ...",
            "https://otx.alienvault.com/indicator/ip/216.40.34.41",
            "Checker By X-SLAYER.exe: 74ca7f6f723a57dc22625eb26214f85689216859388c1f93503728dae8929b97",
            "ns2.tsaratsovo.net",
            "FormBook: FileHash-SHA256 d329608064b13006e73309a6f6a819b6bc1392b80ad01946d04719da0b680955",
            "FormBook: FileHash-SHA1 205a7931e145b05ac6040690d7a2b862b4a1ec79",
            "FormBook: FileHash-MD5 FileHash-MD5 60b8487a9ddc166fbae45d611a0b6848",
            "DotNET_Crypto_Obfuscator",
            "Antivirus Detections: Win32:MalwareX-gen\\ [Trj]",
            "IDS Detections: FormBook CnC Checkin (GET) 403 Forbidden Yara Detections: MAL_RANSOM_COVID19_Apr20_1 ,  DotNET_DotFuscator",
            "Alerts: nids_malware_alert injection_runpe network_icmp network_cnc_http network_http allocates_rwx",
            "Alerts: antisandbox_sleep creates_exe privilege_luid_check checks_debugger",
            "https://otx.alienvault.com/indicator/file/1c954b67c62b161d839434243ebe4b9dfe2b790a91eb968ecbfbfae53a414e29",
            "Antivirus Detections: Win32:MalwareX-gen\\ [Trj] ,  Win.Ransomware.Gandcrab-9967304-0 ,  Ransom:Win32/GandCrab.AE",
            "Yara Detections ReflectiveLoader ,  Win32_Ransomware_GandCrab ,  stack_string",
            "Ransom:Win32/GandCrab.AE: FileHash-SHA256 941ea65563f1b06080075ccafa8180118f65f3c8a4cca038654f0aba5cd0f5fc",
            "Ransom:Win32/GandCrab.AE: FileHash-SHA1 fe29cb8324de15bccfe5055a65ea36141fb794c9",
            "Ransom:Win32/GandCrab.AE: FileHash-MD5 f72bcc0d841008c1e8250a3df1182fd5",
            "1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com. 2.android.com.vance.advanced.tubevanced.adsenseformobileapps.com",
            "mobileview.page, 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com,",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
            "https://www.YouTube.com/polebote"
          ],
          "public": 1,
          "adversary": "Mustang Panda",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Oxypumper-6900445-0",
              "display_name": "Win.Malware.Oxypumper-6900445-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx",
              "display_name": "Backdoor:Win32/Plugx",
              "target": "/malware/Backdoor:Win32/Plugx"
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "TrojanDropper:Win32/Tofsee",
              "display_name": "TrojanDropper:Win32/Tofsee",
              "target": "/malware/TrojanDropper:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 71,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 568,
            "FileHash-SHA1": 537,
            "FileHash-SHA256": 4887,
            "URL": 4773,
            "domain": 2346,
            "hostname": 1884,
            "SSLCertFingerprint": 15,
            "email": 16,
            "CVE": 1
          },
          "indicator_count": 15027,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 235,
          "modified_text": "615 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/c7aa2b182b17cfb5efb3367e0bc7b36e7088ab43a8fb21a772a0f8f90b7329d9",
        "Alerts: disables_security network_icmp modifies_certificates modifies_proxy_wpad multiple_useragents injection_resumethread",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA 256365ffde7df914840eb21c96f34c39912a4b031e3814b8e902b67acee6dff65a1",
        "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-venue",
        "drive.google.com/",
        "Antivirus Detections: Win.Malware.Oxypumper-6900445-0",
        "Interesting: https://otx.alienvault.com/indicator/url/http://google.com.ge/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCoQFjAA&url=http%3A%2F%2Ft1t.us%2F&ei=9H0XU4rwPKXOygP_8IL4Bw&usg=AFQjCNEgQ29Mke-UahuBZ5wqWav04lFYvA&sig2=9-57Skjm2Hu4tg-e8iysQA&bvm=bv.62286460,d.bGQ",
        "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
        "Ransom:Win32/GandCrab.AE: FileHash-MD5 f72bcc0d841008c1e8250a3df1182fd5",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "Antivirus Detections: Win32:TrojanX-gen\\ [Trj] , Win.Malware.Generickdz-6914893-0, Backdoor:Win32/Plugx",
        "https://therahand.com",
        "feedback-pa.clients6.google.com/v1/survey/trigger/",
        "Alerts: antisandbox_sleep creates_exe privilege_luid_check checks_debugger",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/d334c3220573f98da1a0eef13be9c8b0053447519b3a6ace3728bcffa10b99b6",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
        "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
        "userlocation-prod.ingress.kors.microsoft-falcon.net ->",
        "IDS Detections: FormBook CnC Checkin (GET) 403 Forbidden Yara Detections: MAL_RANSOM_COVID19_Apr20_1 ,  DotNET_DotFuscator",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA1  05e520126ee1100c98263bfbd5a6ff0ce6ace4f7",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
        "https://www.red-gate.com/products/smartassembly",
        "To get future Google Chrome updates, you'll need",
        "Yara Detections SUSP_Imphash_Mar23_2",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "http://www.yayabay.com/forum/adclick.php?url=http%3a%2f%2fhkprice.info%2fpornstars%2f22466",
        "IDS Detections: HTTP Executable Download from suspicious domain with direct request/fake browser (multiple families)",
        "https://dnss2.dn2.n-helix.com \u2022 https://dnssounib.dn2.n-helix.com/",
        "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-palisade",
        "google.com.ge , google.kiteflier.top, google.pf, google.com.ht, http://philsinstallation.com/, www.orion.area120.com ?, https://degoogle.xyz/feed/",
        "Yara Detections: SUSP_NET_NAME_ConfuserEx , Delphi Alerts: network_icmp",
        "Ransomware Detected: text artifact in screenshot indicates file may be ransomware details \"Antivirus\" (Source: screen_11.png, Indicator: \"virus\")",
        "IDS Detections: Adware.iBryte.Z Checkin W32/iBryte.Adware Installer Download, Kazy/Kryptor/Cycbot Trojan Checkin 2,",
        "https://asianleak.com/videos/8120/sg-cousin-showering-spy-cam",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "Checker By X-SLAYER.exe: 74ca7f6f723a57dc22625eb26214f85689216859388c1f93503728dae8929b97",
        "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
        "anonsecbotnet.cameraddns.net \u2022 http://anonsecbotnet.cameraddns.net \u2022 https://anonsecbotnet.cameraddns.net",
        "Win.Malware.Oxypumper-6900445-0: FileHash-MD5 2d84a619d4bd339f860cb48af0c9b6c8",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj] ,  Win.Ransomware.Gandcrab-9967304-0 ,  Ransom:Win32/GandCrab.AE",
        "Antivirus Detections: ALF:HSTR:Adware:Win32/iBryte!bit ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47 ,  PWS:Win32/QQpass.B!MTB ,",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "iPhone: 1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com",
        "Interesting: www1.xxx.ddns.info | https://sgpelvicfloor.in/wp-admin/ZDCpqfZDmM5x9MxAaxxX/",
        "Backdoor:Win32/Plugx: FileHash-MD5 63ebfbad26a529929927b9b485faa18a",
        "IDS Detections: FormBook CnC Checkin (GET) W32/iBryte.Adware Affiliate Campaign Executable Download ...",
        "Google.com sorry not sorry index | https://www.google.com/search",
        "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
        "BinBusyBox: 0x.un5t48l3.host",
        "IDS Detections: Win32/QwertMiner CoinMiner Dropper CnC Checkin M2 | IDS Detections: Terse Named Filename EXE Download - Possibly Hostile",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA1 fe29cb8324de15bccfe5055a65ea36141fb794c9",
        "FormBook: FileHash-SHA1 205a7931e145b05ac6040690d7a2b862b4a1ec79",
        "https://otx.alienvault.com/indicator/ip/216.40.34.41",
        "1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com. 2.android.com.vance.advanced.tubevanced.adsenseformobileapps.com",
        "https://www.YouTube.com/polebote",
        "scanning_hosts:  138.197.217.6,  IPv4 142.251.18.103, IPv4 142.251.31.99",
        "FormBook: FileHash-SHA256 d329608064b13006e73309a6f6a819b6bc1392b80ad01946d04719da0b680955",
        "DotNET_Crypto_Obfuscator",
        "https://delivery-mp-microsoft.dvrx.dn3.n-helix.com \u2022 https://dnsplay.dn2.n-helix.com",
        "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
        "https://hyundaibariavungtau3s.com/vehicle/hyundai-custin",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj]",
        "https://hybrid-analysis.com/sample/89fb2bccca6342d8fe50bd8b9763a6c829fd1bfe4fe2eccb251bd7e060f0d168/6691b5695751a70ec9041622",
        "https://hyundaibariavungtau3s.com/vehicle/ioniq-5",
        "zalo.me | href | Binary File | ATT&CK ID T1566.002",
        "Yara Detections ReflectiveLoader ,  Win32_Ransomware_GandCrab ,  stack_string",
        "FormBook: FileHash-MD5 FileHash-MD5 60b8487a9ddc166fbae45d611a0b6848",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "https://hyundaibariavungtau3s.com/vehicle/stargazer",
        "Backdoor:Win32/Plugx: FileHash-SHA256 a3ff97a0d338fd47e0af6822c4ee762491fc39028af984fe7ff8a1b6948fafe9",
        "microsoft-falcon.net",
        "https://www.spytox.com/ | Malicious Phone number & eMail verifier. HoneyPotNetBot?",
        "ns2.tsaratsovo.net",
        "https://otx.alienvault.com/indicator/file/1c954b67c62b161d839434243ebe4b9dfe2b790a91eb968ecbfbfae53a414e29",
        "iPhone: 5.100.3.iphone.com.tranzmate.tranzmate1.adsenseformobileapps.com",
        "Terse Unencrypted Request for Google - Likely Connectivity Check",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "https://hyundaibariavungtau3s.com/wp-content/themes/flatsome/inc/extensions/flatsome-live-search/",
        "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
        "https://iptv.cameraddns.net/kodi/zips/plugin.video.iptvjson]",
        "hattchett.ddns.net",
        "IDS Detections: DNS Query for Suspicious .ml Domain | DNS Query for Suspicious .ga Domain | Domain External IP Lookup ip-api.com | Win32/QwertMiner Suspicious UA (jdlnb)",
        "iOS: http://www.au-petit-cafe-hollywood.com/guestbook/index.php?_sm_byp=iVVJNj4pQQp0ZsWB%3Eshowbox%20install%20iphone%3C/a%3E",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!",
        "redirector.gvt1.com",
        "AS24961 MyLoc Managed IT AG",
        "https://foundry2-lbl.dvr.dn2.n-helix.com/",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA256 941ea65563f1b06080075ccafa8180118f65f3c8a4cca038654f0aba5cd0f5fc",
        "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
        "anonsecbotnet.cameraddns.net \u2022 cameraddns.net \u2022 http://iptv.cameraddns.net/cotich/ \u2022 http://iptv.cameraddns.net/cotichC \u2022",
        "https://account.helix.com/activate/start",
        "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
        "mobileview.page, 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com,",
        "Alerts: nids_malware_alert injection_runpe network_icmp network_cnc_http network_http allocates_rwx",
        "Antivirus Detections: Trojan:Win32/Bulta!rfn ,  TrojanDownloader:Win32/Cutwail ,  TrojanDropper:Win32/Loring ,  TrojanSpy:Win32/Nivdort.CB ,",
        "cpcalendars.hyundaibariavungtau3s.com \u2022 cpcontacts.hyundaibariavungtau3s.com",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "http://bjdclub.ru/out.phtml?www.skyxxxgals.info/feet-licking-porn/",
        "www.socialimages.reputationdatabase.com",
        "https://foundry2-lbl.dvr.dn2.n-helix.com/ \u2022 https://node8-serve.dvrx.dn3.n-helix.com \u2022 https://sfbambi-tel.dn2.n-helix.com \u2022 https://softlayer3.dn2.n-helix.com",
        "iPhone: 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com",
        "iPhone: 8.0.1.iphone.com.nextradiotv.bfmtv.adsenseformobileapps.com",
        "Antivirus Detections: TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA ,  TrojanSpy:Win32/Nivdort.DB ... ,  TrojanSpy:Win32/Nivdort.CB ,  TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA",
        "https://feedback-pa.clients6.google.com/v1/survey/trigger/trigger_anonymous?key=AIzaSyD3LJeW4Q6gtdgJlyeFZUp-GhpIoc6EUeg"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Mustang Panda",
            "NSO Pegasus"
          ],
          "malware_families": [
            "Virtool:win32/obfuscator.ki",
            "Trojan:msil/clipbanker",
            "Win32:malob-db\\ [cryp]",
            "Win.malware.oxypumper-6900445-0",
            "Mydoom checkin",
            "Backdoor:msil/bladabindi.aj gc!",
            "Win.dropper.njrat-10015886-0",
            "Nid",
            "Elf:gafgyt-dz\\ [trj]",
            "Win.malware.bzub-6727003-0",
            "Win.packed.fecn-7077459-0",
            "Win.packed.generic-9795615-0",
            "Win.packed.generic-9795615-0\t.",
            "Cycbot",
            "Win.virus.virlock-6804475-0",
            "Win.trojan.generic-9801687-0",
            "Trojan:msil/ranos.a",
            "Backdoor:win32/plugx",
            "Ransom:win32/gandcrab.ae",
            "Other malware",
            "Upatre",
            "Win.trojan.generic-6417450-0",
            "Alf:backdoor:msil/noancooe.ka",
            "Trojan:win32/floxif.e",
            "Unix.trojan.mirai-5607483-0",
            "Elf:mirai-gh\\ [trj]",
            "Fakeav.for",
            "Pegasus",
            "Mirai",
            "Trojandropper:win32/tofsee",
            "Backdoor:msil/bladabindi.aj",
            "Trojan:win32/mira",
            "Win.trojan.agent-306281",
            "Trojanspy",
            "Backdoor:win32/tofsee.t",
            "Win.packed.msilperseus-9956592-0"
          ],
          "industries": [],
          "unique_indicators": 38016
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/bitechnologies.ng",
    "whois": "http://whois.domaintools.com/bitechnologies.ng",
    "domain": "bitechnologies.ng",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "69544c73467a9c3858556698",
      "name": "Mira Malware Drive By Compromise Google.com search engine  | Microsoft | Apple",
      "description": "Microsoft Mira Malware Drive By Compromise Google.com.\n Device infected with MyDoom zombie maker. \nEstablished user location, screen captures, corrupted Apple device via Google search engine browser redirect. Attack began 12.30.2025 past midnight. Threat actor powered on cameras, microphones, and preformed their hacker intentions. #stateofcolorado",
      "modified": "2026-01-29T21:02:54.448000",
      "created": "2025-12-30T22:04:35.565000",
      "tags": [
        "content",
        "kb body",
        "p3p cp",
        "date tue",
        "gmt server",
        "html info",
        "12.30.2025",
        "urls",
        "url add",
        "http",
        "ip address",
        "related nids",
        "files location",
        "united",
        "flag united",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "assigned pa",
        "status",
        "whois server",
        "ripe ncc",
        "ripe network",
        "abuse contact",
        "orgid",
        "address",
        "orgabuseref",
        "postalcode",
        "ripe",
        "email",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "found",
        "ssl certificate",
        "execution",
        "google llc",
        "ascii text",
        "mitre att",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "data upload",
        "extraction",
        "ta0004",
        "evasion ta0005",
        "injection t1055",
        "t1055",
        "col ta0011",
        "l t1071",
        "encrypted ch",
        "t1573",
        "present nov",
        "present oct",
        "certificate",
        "present dec",
        "aaaa",
        "search",
        "servers",
        "record value",
        "emails",
        "title",
        "leveidiuelabs",
        "include",
        "review",
        "exclude data",
        "suggested ogs",
        "find s",
        "command decode",
        "development att",
        "initial access",
        "t1189 driveby",
        "html",
        "execution att",
        "href",
        "size",
        "pattern match",
        "filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "medium risk",
        "malware",
        "trojan",
        "mira malware",
        "push",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "yara rule",
        "program",
        "runtime error",
        "medium",
        "python",
        "win64",
        "unknown",
        "guard",
        "accept",
        "write",
        "launcher",
        "updater",
        "smartassembly",
        "delphi",
        "ee fc",
        "ff d5",
        "f0 ff",
        "eb e1",
        "ff ff",
        "c1 e8",
        "c1 c0",
        "eb e8",
        "copy",
        "next",
        "mydoom checkin",
        "win32mydoom dec",
        "name servers",
        "creation date",
        "passive dns",
        "domain",
        "expiration date",
        "hostname",
        "date",
        "google chrome",
        "screen capture",
        "locate human",
        "target",
        "black hat",
        "apple",
        "microsoft",
        "google",
        "stateofcolorado",
        "christopher ahmann",
        "brian sabey"
      ],
      "references": [
        "Google.com sorry not sorry index | https://www.google.com/search",
        "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
        "redirector.gvt1.com",
        "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
        "microsoft-falcon.net",
        "hattchett.ddns.net",
        "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
        "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
        "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
        "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
        "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
        "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
        "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
        "Yara Detections SUSP_Imphash_Mar23_2",
        "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
        "userlocation-prod.ingress.kors.microsoft-falcon.net ->",
        "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
        "To get future Google Chrome updates, you'll need"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Mira",
          "display_name": "Trojan:Win32/Mira",
          "target": "/malware/Trojan:Win32/Mira"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Mydoom Checkin",
          "display_name": "Mydoom Checkin",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1048.001",
          "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
          "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1939,
        "hostname": 1205,
        "URL": 3310,
        "domain": 432,
        "FileHash-MD5": 396,
        "CIDR": 3,
        "email": 16,
        "FileHash-SHA1": 373,
        "SSLCertFingerprint": 13,
        "CVE": 1
      },
      "indicator_count": 7688,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "79 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6951f52a5af00a9be445ad41",
      "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
      "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
      "modified": "2026-01-28T02:03:16.337000",
      "created": "2025-12-29T03:27:38.183000",
      "tags": [
        "no expiration",
        "expiration",
        "url http",
        "url https",
        "iocs",
        "enter source",
        "url or",
        "name servers",
        "a domains",
        "accept encoding",
        "urls",
        "emails",
        "servers",
        "url add",
        "http",
        "files domain",
        "files related",
        "related tags",
        "united",
        "gmt contenttype",
        "ipv4 add",
        "url analysis",
        "files",
        "present dec",
        "cname",
        "virtool",
        "cryp",
        "ip address",
        "trojan",
        "win32",
        "therahand",
        "jeffrey reimer",
        "reimer  dpt",
        "msie",
        "chrome",
        "unknown ns",
        "unknown cname",
        "record value",
        "accept",
        "encrypt",
        "passive dns",
        "moved",
        "wp engine",
        "meta",
        "wordpress",
        "pegasus",
        "america flag",
        "america asn",
        "reverse dns",
        "flag",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "analysis",
        "tor analysis",
        "dns requests",
        "united states",
        "hostname",
        "pulse submit",
        "domain",
        "files ip",
        "eva lisa",
        "eva reimer",
        "all ipv4",
        "dynamic_content",
        "fingerprinting",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "status",
        "hostname add",
        "evasion",
        "proximity",
        "pulse pulses",
        "address",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "command",
        "initial access",
        "spawns",
        "present mar",
        "present jun",
        "title",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "data recovery",
        "ms windows",
        "process32nextw",
        "intel",
        "pe32",
        "format",
        "mozilla",
        "installcapital",
        "generic",
        "write",
        "unknown",
        "malware",
        "next",
        "installer",
        "template",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "script script",
        "pragma",
        "port",
        "destination",
        "binbusybox",
        "high",
        "post",
        "icmp traffic",
        "dns query",
        "newstatusurl",
        "mirai",
        "prefetch8",
        "ck matrix",
        "localappdata",
        "info",
        "ssl certificate",
        "czech republic",
        "prefetch1",
        "prefetch2",
        "israel israel",
        "analysis tip",
        "href",
        "ascii text",
        "null",
        "refresh",
        "span",
        "iframe",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "beginstring",
        "windir",
        "openurl c",
        "programfiles",
        "related nids",
        "files location",
        "flag united",
        "dynamicloader",
        "medium",
        "named pipe",
        "win64",
        "download",
        "delphi",
        "smartassembly",
        "m. brian sabey",
        "quasi government",
        "no such agency",
        "facebook",
        "search",
        "date",
        "showing",
        "ukraine",
        "\u2018buzz\u2019",
        "alex karp",
        "peter theil",
        "elon musk",
        "ff d5",
        "yara rule",
        "ee fc",
        "generic http",
        "exe upload",
        "f0 ff",
        "eb e1",
        "ff bb",
        "show process",
        "sha1",
        "sub domain",
        "show technique",
        "network traffic",
        "class",
        "starfield",
        "cyber crime",
        "yara detections",
        "top source",
        "top destination",
        "source source",
        "filehash",
        "sha256 add",
        "av detections",
        "ids detections",
        "alerts",
        "show",
        "dock",
        "execution",
        "present feb",
        "value",
        "content type",
        "mirai",
        "sha256",
        "body",
        "gmt content",
        "ddos",
        "mtb sep",
        "hosting",
        "domain robot",
        "expiration date",
        "welcome",
        "apple",
        "christopher p. ahmann",
        "tsara",
        "monitored target",
        "github https",
        "github",
        "smart assembly",
        "red hat",
        "hackers",
        "google"
      ],
      "references": [
        "https://therahand.com",
        "www.socialimages.reputationdatabase.com",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "BinBusyBox: 0x.un5t48l3.host",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "AS24961 MyLoc Managed IT AG",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://www.red-gate.com/products/smartassembly",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
      ],
      "public": 1,
      "adversary": "NSO Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-306281",
          "display_name": "Win.Trojan.Agent-306281",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.KI",
          "display_name": "VirTool:Win32/Obfuscator.KI",
          "target": "/malware/VirTool:Win32/Obfuscator.KI"
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "ELF:Gafgyt-DZ\\ [Trj]",
          "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-5607483-0",
          "display_name": "Unix.Trojan.Mirai-5607483-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1036.005",
          "name": "Match Legitimate Name or Location",
          "display_name": "T1036.005 - Match Legitimate Name or Location"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 523,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 2165,
        "URL": 4953,
        "domain": 1118,
        "hostname": 1951,
        "email": 12,
        "SSLCertFingerprint": 52,
        "CVE": 2
      },
      "indicator_count": 11178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "81 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692d02f096f3ec8b5b507496",
      "name": "Google Drive: Share Files Online with Secure Cloud Storage | Google Workspace",
      "description": "nJRAT | Corrupted Google Drive sent to targets former device. Years long social engineering may have been involved. All\nIoC\u2019s Appears to involve years of social engineering. Google\ndrive service in question is a storage service based in Vietnam. | \n\nBotnet / Check-ins / Spyware / Cams. [Anon Sec Botnet subdomain name pulsed.  Close directly related to zalo.me\nand tbtteams.com]\nRequires further research.\n\nThis pulse is a bit confusing due where and who it originated from.",
      "modified": "2025-12-31T02:01:50.101000",
      "created": "2025-12-01T02:52:32.483000",
      "tags": [
        "business",
        "enterprise",
        "drive",
        "english",
        "google drive",
        "try drive",
        "business small",
        "workspace",
        "sign",
        "strong",
        "find",
        "life",
        "tools",
        "protect",
        "cloud",
        "simple",
        "android",
        "indonesia",
        "video",
        "mb download",
        "shared may",
        "shared",
        "learn",
        "drive drive",
        "name date",
        "javascript",
        "dynamicloader",
        "medium",
        "minimal headers",
        "high",
        "observed get",
        "get http",
        "united",
        "yara rule",
        "http",
        "write",
        "guard",
        "malware",
        "read c",
        "ms windows",
        "intel",
        "png image",
        "rgba",
        "pe32",
        "get na",
        "explorer",
        "music",
        "virlock",
        "media",
        "ho chi",
        "minh city",
        "viet nam",
        "storage company",
        "limited",
        "google",
        "address as",
        "luutruso",
        "cloudflar",
        "domain",
        "asn15169",
        "asn56153",
        "asn13335",
        "cisco",
        "umbrella rank",
        "apex domain",
        "url https",
        "kb stylesheet",
        "kb font",
        "kb image",
        "image",
        "kb script",
        "november",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "redirect chain",
        "kb document",
        "urls",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "t1590 gather",
        "windir",
        "openurl c",
        "prefetch2",
        "tor analysis",
        "dns requests",
        "domain address",
        "rsdsq jfu",
        "ollydbg ollydbg",
        "wireshark",
        "external",
        "binary file",
        "mitre att",
        "ck matrix",
        "aaaa",
        "cong ty",
        "co phan",
        "code",
        "province hcm",
        "files",
        "ip address",
        "request",
        "flag",
        "country",
        "contacted hosts",
        "process details",
        "link initial",
        "t1480 execution",
        "domains",
        "moved",
        "gmt content",
        "all ipv4",
        "url analysis",
        "location viet",
        "title",
        "error",
        "problem",
        "url add",
        "related nids",
        "files location",
        "flag united",
        "development att",
        "name server",
        "markmonitor",
        "localappdata",
        "programfiles",
        "edge",
        "hyundai",
        "social engineering",
        ".mil",
        "hackers",
        "phishing eml",
        "summary",
        "cisco umbrella",
        "google safe",
        "browsing",
        "current dns",
        "a record",
        "ip information",
        "ipasns ip",
        "detail domain",
        "domain tree",
        "links apex",
        "transfer",
        "b script",
        "b stylesheet",
        "frame b830",
        "b document",
        "value",
        "december",
        "degurafregistry",
        "gat object",
        "jsl object",
        "gapijstiming",
        "iframe function",
        "domainpath name",
        "nid value",
        "source level",
        "files domain",
        "files related",
        "tags",
        "related tags",
        "virustotal",
        "foundry",
        "pulse otx",
        "dark",
        "vietnam",
        "present aug",
        "present nov",
        "present jul",
        "present sep",
        "unknown aaaa",
        "search",
        "name servers",
        "present oct",
        "trojan",
        "data upload",
        "extraction",
        "se https",
        "include review",
        "exclude sugges",
        "find s",
        "failed",
        "typ don",
        "faith",
        "study",
        "romeo\u2019s",
        "juliettes",
        "femme fatales",
        "strategy",
        "honey pot",
        "honey traps",
        "spy",
        "helix",
        "anons",
        "passive dns",
        "pulse pulses",
        "files ip",
        "address",
        "location united",
        "asn as400519",
        "whois registrar",
        "ms defender",
        "files matching",
        "number",
        "sample analysis",
        "hide samples",
        "date hash",
        "cameras",
        "cams",
        "spycam",
        "botnet",
        "vietnam",
        "company limited",
        "dnssec",
        "status",
        "india unknown",
        "present may",
        "espionage",
        "hostname add",
        "generic",
        "cnc activity",
        "backdoor",
        "ipv4",
        "anonsecbotnet",
        "iptv"
      ],
      "references": [
        "drive.google.com/",
        "https://foundry2-lbl.dvr.dn2.n-helix.com/",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/c7aa2b182b17cfb5efb3367e0bc7b36e7088ab43a8fb21a772a0f8f90b7329d9",
        "zalo.me | href | Binary File | ATT&CK ID T1566.002",
        "https://account.helix.com/activate/start",
        "anonsecbotnet.cameraddns.net \u2022 cameraddns.net \u2022 http://iptv.cameraddns.net/cotich/ \u2022 http://iptv.cameraddns.net/cotichC \u2022",
        "https://iptv.cameraddns.net/kodi/zips/plugin.video.iptvjson]",
        "Terse Unencrypted Request for Google - Likely Connectivity Check",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/c7aa2b182b17cfb5efb3367e0bc7b36e7088ab43a8fb21a772a0f8f90b7329d9",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/d334c3220573f98da1a0eef13be9c8b0053447519b3a6ace3728bcffa10b99b6",
        "cpcalendars.hyundaibariavungtau3s.com \u2022 cpcontacts.hyundaibariavungtau3s.com",
        "https://hyundaibariavungtau3s.com/vehicle/stargazer",
        "https://hyundaibariavungtau3s.com/vehicle/ioniq-5",
        "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-venue",
        "https://hyundaibariavungtau3s.com/vehicle/new-hyundai-palisade",
        "https://hyundaibariavungtau3s.com/vehicle/hyundai-custin",
        "https://hyundaibariavungtau3s.com/wp-content/themes/flatsome/inc/extensions/flatsome-live-search/",
        "https://delivery-mp-microsoft.dvrx.dn3.n-helix.com \u2022 https://dnsplay.dn2.n-helix.com",
        "https://dnss2.dn2.n-helix.com \u2022 https://dnssounib.dn2.n-helix.com/",
        "https://foundry2-lbl.dvr.dn2.n-helix.com/ \u2022 https://node8-serve.dvrx.dn3.n-helix.com \u2022 https://sfbambi-tel.dn2.n-helix.com \u2022 https://softlayer3.dn2.n-helix.com",
        "http://bjdclub.ru/out.phtml?www.skyxxxgals.info/feet-licking-porn/",
        "http://www.yayabay.com/forum/adclick.php?url=http%3a%2f%2fhkprice.info%2fpornstars%2f22466",
        "https://asianleak.com/videos/8120/sg-cousin-showering-spy-cam",
        "feedback-pa.clients6.google.com/v1/survey/trigger/",
        "https://feedback-pa.clients6.google.com/v1/survey/trigger/trigger_anonymous?key=AIzaSyD3LJeW4Q6gtdgJlyeFZUp-GhpIoc6EUeg",
        "anonsecbotnet.cameraddns.net \u2022 http://anonsecbotnet.cameraddns.net \u2022 https://anonsecbotnet.cameraddns.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Virus.Virlock-6804475-0",
          "display_name": "Win.Virus.Virlock-6804475-0",
          "target": null
        },
        {
          "id": "Win.Malware.Bzub-6727003-0",
          "display_name": "Win.Malware.Bzub-6727003-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9801687-0",
          "display_name": "Win.Trojan.Generic-9801687-0",
          "target": null
        },
        {
          "id": "NID",
          "display_name": "NID",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Dropper.njRAT-10015886-0",
          "display_name": "Win.Dropper.njRAT-10015886-0",
          "target": null
        },
        {
          "id": "Win.Packed.Generic-9795615-0",
          "display_name": "Win.Packed.Generic-9795615-0",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Bladabindi.AJ GC!",
          "display_name": "Backdoor:MSIL/Bladabindi.AJ GC!",
          "target": "/malware/Backdoor:MSIL/Bladabindi.AJ GC!"
        },
        {
          "id": "Win.Packed.Generic-9795615-0\t.",
          "display_name": "Win.Packed.Generic-9795615-0\t.",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Bladabindi.AJ",
          "display_name": "Backdoor:MSIL/Bladabindi.AJ",
          "target": "/malware/Backdoor:MSIL/Bladabindi.AJ"
        },
        {
          "id": "Win.Packed.Fecn-7077459-0",
          "display_name": "Win.Packed.Fecn-7077459-0",
          "target": null
        },
        {
          "id": "Trojan:MSIL/Ranos.A",
          "display_name": "Trojan:MSIL/Ranos.A",
          "target": "/malware/Trojan:MSIL/Ranos.A"
        },
        {
          "id": "Win.Trojan.Generic-6417450-0",
          "display_name": "Win.Trojan.Generic-6417450-0",
          "target": null
        },
        {
          "id": "ALF:Backdoor:MSIL/Noancooe.KA",
          "display_name": "ALF:Backdoor:MSIL/Noancooe.KA",
          "target": null
        },
        {
          "id": "Win.Packed.Msilperseus-9956592-0",
          "display_name": "Win.Packed.Msilperseus-9956592-0",
          "target": null
        },
        {
          "id": "Trojan:MSIL/ClipBanker",
          "display_name": "Trojan:MSIL/ClipBanker",
          "target": "/malware/Trojan:MSIL/ClipBanker"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1194",
          "name": "Spearphishing via Service",
          "display_name": "T1194 - Spearphishing via Service"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1039",
          "name": "Data from Network Shared Drive",
          "display_name": "T1039 - Data from Network Shared Drive"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1567.002",
          "name": "Exfiltration to Cloud Storage",
          "display_name": "T1567.002 - Exfiltration to Cloud Storage"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1911,
        "hostname": 714,
        "FileHash-SHA256": 1304,
        "FileHash-MD5": 159,
        "FileHash-SHA1": 71,
        "SSLCertFingerprint": 2,
        "domain": 421,
        "CVE": 1,
        "email": 4
      },
      "indicator_count": 4587,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "109 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6692440efac39f5213329f13",
      "name": "Mustang Panda: Oxypumper | Ransom Suspicious verifier SpyTox",
      "description": "Mustang Panda is an alleged;China-based' non-governmental cyber espionage threat actor that was first observed in 2017. Targeting non-governmental civilians. Likely target is in many bot networks. Potential HoneyPot, this tool makes itself visible to target when researching the validity of an email or phone number. Notable for Gand Crane ransomware text embedded in SpyTox page image. Injection process observed. Affects most types of devices including iOS and Android. Critical issues found. IP's registrar's, domains 'not' contacted.\n\nHackers, harassment, cybercrime, cyber espionage.",
      "modified": "2024-08-12T08:04:00.041000",
      "created": "2024-07-13T09:08:30.431000",
      "tags": [
        "historical ssl",
        "referrer",
        "june",
        "october",
        "july",
        "hacker",
        "pe resource",
        "mustang panda",
        "plugx",
        "cryptbot",
        "threat roundup",
        "december",
        "process32nextw",
        "regsetvalueexa",
        "x00x00",
        "regdword",
        "memcommit",
        "high",
        "regbinary",
        "okrnserver",
        "regsetvalueexw",
        "download",
        "copy",
        "as15169 google",
        "united",
        "aaaa",
        "unknown",
        "gmt path",
        "passive dns",
        "search",
        "cname",
        "showing",
        "cookie",
        "ascii text",
        "pattern match",
        "error",
        "null",
        "typeerror",
        "sha1",
        "mitre att",
        "et tor",
        "known tor",
        "date",
        "infinity",
        "onload",
        "trident",
        "android",
        "void",
        "hybrid",
        "local",
        "encrypt",
        "click",
        "strings",
        "generator",
        "third-party-cookies",
        "text/html",
        "trackers",
        "external-resources",
        "iframes",
        "entries",
        "status",
        "name servers",
        "urls",
        "next",
        "nxdomain",
        "susp",
        "a nxdomain",
        "domain",
        "win32",
        "as62597",
        "france unknown",
        "for privacy",
        "moved",
        "a domains",
        "meta",
        "gmt cache",
        "trojan",
        "creation date",
        "record value",
        "script urls",
        "as55293 a2",
        "as44273 host",
        "canada unknown",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "files",
        "ip address",
        "location canada",
        "443 ma2592000",
        "code",
        "trojanspy",
        "type",
        "ipv4",
        "twitter",
        "trojandropper",
        "find",
        "form",
        "less see",
        "formbook cnc",
        "checkin",
        "a li",
        "li ul",
        "cycbot",
        "emails",
        "as20940",
        "as54113",
        "asnone denmark",
        "worm",
        "asnone",
        "as4230 claro",
        "refloadapihash",
        "salicode",
        "div div",
        "wi fi",
        "orion wi",
        "orion",
        "a div",
        "div section",
        "orion logo",
        "target",
        "fast",
        "contact",
        "open",
        "virtool",
        "content type",
        "found",
        "http response",
        "final url",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "ubuntu",
        "accept",
        "keepalive",
        "site",
        "find people",
        "numbers",
        "sptox",
        "utc google",
        "html info",
        "title spytox",
        "emails meta",
        "tags viewport",
        "spytox og",
        "type win32",
        "exe size",
        "mb first",
        "seen",
        "file name",
        "avg win32",
        "fortinet",
        "double click",
        "solutions",
        "domains",
        "sneaky server",
        "replacement",
        "unauthorized",
        "malware http",
        "core",
        "sim unlock",
        "emotet",
        "ta569",
        "critical",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 protector",
        "confuser",
        "confuserex",
        "checker",
        "samplename",
        "bonusbitcoin",
        "xslayer",
        "samplepath",
        "names",
        "details",
        "header intel",
        "name md5",
        "language",
        "contained",
        "rticon neutral",
        "ico rtgroupicon",
        "neutral",
        "assembly common",
        "clr version",
        "assembly name",
        "metadata header",
        "entry point",
        "rva entry",
        "strong name",
        "streams size",
        "entropy chi2",
        "ip detections",
        "country",
        "executable",
        "info header",
        "allmul vbaget4",
        "adjfprem ord",
        "data rtversion",
        "generic",
        "file type",
        "win32 exe",
        "kb file",
        "graph",
        "user",
        "windir",
        "downloads",
        "written c",
        "files deleted",
        "dropped c",
        "process",
        "logistics",
        "cyber defense",
        "brazzers",
        "tsara brashears",
        "gpt analyzer",
        "apple private",
        "data collection",
        "twitter andor",
        "snatch",
        "ransomware",
        "default",
        "rticon english",
        "type name",
        "data",
        "getfilesize",
        "getdc copyimage",
        "rticon russian",
        "pe32 executable",
        "borland delphi",
        "delphi generic",
        "dos borland",
        "hkcuclsid",
        "registry keys",
        "hkcrclsid",
        "file system",
        "settings c",
        "files c",
        "shared c",
        "sharedink c",
        "hostname",
        "as29791",
        "as8426 claranet",
        "malware",
        "network",
        "apple ios",
        "apple",
        "tmobile metro",
        "apeaksoft ios",
        "spybanker",
        "remcos",
        "adwind",
        "njrat",
        "guloader",
        "banload",
        "asyncrat",
        "arkeistealer",
        "danabot",
        "nordvpnsetup",
        "kb graph",
        "summary",
        "sharedinkarsa c",
        "sharedinkbgbg c",
        "sharedinkcscz c",
        "sharedinkdadk c",
        "gmt etag",
        "x amz",
        "body",
        "body html",
        "bq jul",
        "et trojan",
        "v4inhxvlhx0",
        "medium",
        "memreserve",
        "checks amount",
        "t1082",
        "module load",
        "e weowe64e",
        "edelepexe",
        "e rev",
        "weinedoewse net",
        "ransom",
        "show",
        "filehash",
        "related",
        "reverse dns",
        "haut",
        "servers",
        "pulse submit",
        "as3215 orange",
        "france",
        "backdoor",
        "paris",
        "honeypot",
        "python",
        "callback phishing",
        "teams",
        "porn related",
        "harassment"
      ],
      "references": [
        "https://www.spytox.com/ | Malicious Phone number & eMail verifier. HoneyPotNetBot?",
        "Alerts: disables_security network_icmp modifies_certificates modifies_proxy_wpad multiple_useragents injection_resumethread",
        "Antivirus Detections: Win.Malware.Oxypumper-6900445-0",
        "IDS Detections: Win32/QwertMiner CoinMiner Dropper CnC Checkin M2 | IDS Detections: Terse Named Filename EXE Download - Possibly Hostile",
        "IDS Detections: HTTP Executable Download from suspicious domain with direct request/fake browser (multiple families)",
        "IDS Detections: DNS Query for Suspicious .ml Domain | DNS Query for Suspicious .ga Domain | Domain External IP Lookup ip-api.com | Win32/QwertMiner Suspicious UA (jdlnb)",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA1  05e520126ee1100c98263bfbd5a6ff0ce6ace4f7",
        "Win.Malware.Oxypumper-6900445-0: FileHash-MD5 2d84a619d4bd339f860cb48af0c9b6c8",
        "Win.Malware.Oxypumper-6900445-0: FileHash-SHA 256365ffde7df914840eb21c96f34c39912a4b031e3814b8e902b67acee6dff65a1",
        "Interesting: https://otx.alienvault.com/indicator/url/http://google.com.ge/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCoQFjAA&url=http%3A%2F%2Ft1t.us%2F&ei=9H0XU4rwPKXOygP_8IL4Bw&usg=AFQjCNEgQ29Mke-UahuBZ5wqWav04lFYvA&sig2=9-57Skjm2Hu4tg-e8iysQA&bvm=bv.62286460,d.bGQ",
        "google.com.ge , google.kiteflier.top, google.pf, google.com.ht, http://philsinstallation.com/, www.orion.area120.com ?, https://degoogle.xyz/feed/",
        "https://hybrid-analysis.com/sample/89fb2bccca6342d8fe50bd8b9763a6c829fd1bfe4fe2eccb251bd7e060f0d168/6691b5695751a70ec9041622",
        "Ransomware Detected: text artifact in screenshot indicates file may be ransomware details \"Antivirus\" (Source: screen_11.png, Indicator: \"virus\")",
        "scanning_hosts:  138.197.217.6,  IPv4 142.251.18.103, IPv4 142.251.31.99",
        "Backdoor:Win32/Plugx: FileHash-SHA256 a3ff97a0d338fd47e0af6822c4ee762491fc39028af984fe7ff8a1b6948fafe9",
        "Backdoor:Win32/Plugx: FileHash-MD5 63ebfbad26a529929927b9b485faa18a",
        "Antivirus Detections: Win32:TrojanX-gen\\ [Trj] , Win.Malware.Generickdz-6914893-0, Backdoor:Win32/Plugx",
        "Yara Detections: SUSP_NET_NAME_ConfuserEx , Delphi Alerts: network_icmp",
        "iPhone: 8.0.1.iphone.com.nextradiotv.bfmtv.adsenseformobileapps.com",
        "iPhone: 5.100.3.iphone.com.tranzmate.tranzmate1.adsenseformobileapps.com",
        "iPhone: 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com",
        "iPhone: 1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com",
        "iOS: http://www.au-petit-cafe-hollywood.com/guestbook/index.php?_sm_byp=iVVJNj4pQQp0ZsWB%3Eshowbox%20install%20iphone%3C/a%3E",
        "Interesting: www1.xxx.ddns.info | https://sgpelvicfloor.in/wp-admin/ZDCpqfZDmM5x9MxAaxxX/",
        "DotNET_Crypto_Obfuscator",
        "Antivirus Detections: ALF:HSTR:Adware:Win32/iBryte!bit ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47 ,  PWS:Win32/QQpass.B!MTB ,",
        "Antivirus Detections: Trojan:Win32/Bulta!rfn ,  TrojanDownloader:Win32/Cutwail ,  TrojanDropper:Win32/Loring ,  TrojanSpy:Win32/Nivdort.CB ,",
        "Antivirus Detections: TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA ,  TrojanSpy:Win32/Nivdort.DB ... ,  TrojanSpy:Win32/Nivdort.CB ,  TrojanSpy:Win32/Nivdort.CW ,  TrojanSpy:Win32/Nivdort.DA",
        "IDS Detections: Adware.iBryte.Z Checkin W32/iBryte.Adware Installer Download, Kazy/Kryptor/Cycbot Trojan Checkin 2,",
        "IDS Detections: FormBook CnC Checkin (GET) W32/iBryte.Adware Affiliate Campaign Executable Download ...",
        "https://otx.alienvault.com/indicator/ip/216.40.34.41",
        "Checker By X-SLAYER.exe: 74ca7f6f723a57dc22625eb26214f85689216859388c1f93503728dae8929b97",
        "ns2.tsaratsovo.net",
        "FormBook: FileHash-SHA256 d329608064b13006e73309a6f6a819b6bc1392b80ad01946d04719da0b680955",
        "FormBook: FileHash-SHA1 205a7931e145b05ac6040690d7a2b862b4a1ec79",
        "FormBook: FileHash-MD5 FileHash-MD5 60b8487a9ddc166fbae45d611a0b6848",
        "DotNET_Crypto_Obfuscator",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj]",
        "IDS Detections: FormBook CnC Checkin (GET) 403 Forbidden Yara Detections: MAL_RANSOM_COVID19_Apr20_1 ,  DotNET_DotFuscator",
        "Alerts: nids_malware_alert injection_runpe network_icmp network_cnc_http network_http allocates_rwx",
        "Alerts: antisandbox_sleep creates_exe privilege_luid_check checks_debugger",
        "https://otx.alienvault.com/indicator/file/1c954b67c62b161d839434243ebe4b9dfe2b790a91eb968ecbfbfae53a414e29",
        "Antivirus Detections: Win32:MalwareX-gen\\ [Trj] ,  Win.Ransomware.Gandcrab-9967304-0 ,  Ransom:Win32/GandCrab.AE",
        "Yara Detections ReflectiveLoader ,  Win32_Ransomware_GandCrab ,  stack_string",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA256 941ea65563f1b06080075ccafa8180118f65f3c8a4cca038654f0aba5cd0f5fc",
        "Ransom:Win32/GandCrab.AE: FileHash-SHA1 fe29cb8324de15bccfe5055a65ea36141fb794c9",
        "Ransom:Win32/GandCrab.AE: FileHash-MD5 f72bcc0d841008c1e8250a3df1182fd5",
        "1.2.6.iphone.com.qijitech.themes.adsenseformobileapps.com. 2.android.com.vance.advanced.tubevanced.adsenseformobileapps.com",
        "mobileview.page, 3.65.0.iphone.com.shotzoom.tourcaddie.adsenseformobileapps.com,",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "https://www.YouTube.com/polebote"
      ],
      "public": 1,
      "adversary": "Mustang Panda",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Oxypumper-6900445-0",
          "display_name": "Win.Malware.Oxypumper-6900445-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx",
          "display_name": "Backdoor:Win32/Plugx",
          "target": "/malware/Backdoor:Win32/Plugx"
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "TrojanDropper:Win32/Tofsee",
          "display_name": "TrojanDropper:Win32/Tofsee",
          "target": "/malware/TrojanDropper:Win32/Tofsee"
        }
      ],
      "attack_ids": [
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 71,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 568,
        "FileHash-SHA1": 537,
        "FileHash-SHA256": 4887,
        "URL": 4773,
        "domain": 2346,
        "hostname": 1884,
        "SSLCertFingerprint": 15,
        "email": 16,
        "CVE": 1
      },
      "indicator_count": 15027,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 235,
      "modified_text": "615 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://bitechnologies.ng",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://bitechnologies.ng",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776616627.474002
}