{
  "type": "URL",
  "indicator": "https://block2.mmms.eu",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://block2.mmms.eu",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3609929378,
      "indicator": "https://block2.mmms.eu",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 36,
      "pulses": [
        {
          "id": "69a1a73eb0578b92962dae97",
          "name": "FBI Link (Ransomware)sent to a device. opened on its own. Why?",
          "description": "I wouldn\u2019t typically search an alleged authentic government site , except it opened on a device, no prompt. TrojanDownloader:Win32/Dalexis!rfn!rfn\nIDS Detections\nMaktub Locker TOR Status Check\nTOR Consensus Data Requested\nTOR 1.0 Server Key Retrieval\nTor Get Server Request\nTLS Handshake Failure\nYara Detections\nstack_string\nWho is : [URL\n[https://tor-dirauth.sebastianhahn.net/]\n[https://tor.sebastianhahn.net]\n[tor-dirauth.sebastianhahn.net]\n->gitbot.faui2k9.de\n[Status faui2k9.de -connect] connects to device \n100% Malicious | https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70 |  [External resources discovered in HTML content:\ndap.digitalgov.gov | Pattern match: \"fbi.gov/contact-us/field-offices/denver/news/pr\"\nHeuristic match: \"x.com\" | will revisit",
          "modified": "2026-03-29T13:04:34.750000",
          "created": "2026-02-27T14:16:30.498000",
          "tags": [
            "regopenkeyexw",
            "port",
            "destination",
            "cryptexportkey",
            "search",
            "show",
            "entries",
            "windows nt",
            "regsetvalueexa",
            "ip address",
            "malware",
            "copy",
            "write",
            "win32",
            "next",
            "format",
            "contacted",
            "less ip",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "date",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "february",
            "failed",
            "enter",
            "data upload",
            "passive dns",
            "urls",
            "aaaa",
            "certificate",
            "otx logo",
            "all hostname",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "title",
            "body",
            "encrypt",
            "netherlands",
            "gmt content",
            "all ipv4",
            "amsterdam",
            "hetzner online",
            "gmbh",
            "summary",
            "url age",
            "de seen",
            "general info",
            "geo germany",
            "as as24940",
            "de note",
            "route",
            "direct",
            "pro platform",
            "logs",
            "suricata alert",
            "et info",
            "tls handshake",
            "bad traffic",
            "suricata alerts",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "size",
            "sha256",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "path",
            "unknown",
            "stop",
            "root",
            "hybrid",
            "general",
            "local",
            "form",
            "click",
            "strings",
            "9999",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "show technique",
            "ck matrix",
            "href",
            "antivirus",
            "maktub locker",
            "tor status",
            "check"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1129,
            "domain": 148,
            "hostname": 753,
            "FileHash-SHA256": 548,
            "FileHash-MD5": 90,
            "FileHash-SHA1": 71,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 2752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65359c9a15459988a9b779d9",
          "name": "Switzerland",
          "description": "",
          "modified": "2026-03-10T21:45:03.925000",
          "created": "2023-10-22T22:05:14.192000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3889,
            "hostname": 5284,
            "FileHash-SHA256": 1343,
            "domain": 1430,
            "CVE": 3
          },
          "indicator_count": 11949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 179,
          "modified_text": "40 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "695fd5fa266f9ea34c8f5c45",
          "name": "Cats and Kittens Attack Mirai Botnet and how it may target Threat Exchange users",
          "description": "Cat attacks related to LummaC2 attacks,info stealing, domain seizures, etc. Including are references to the Lumma C2 with cats and Aura Stealer attacks. Same attack group , includes Mirai Botnet. Has the group become a larger , stronger adversary? \nSony Music connection. I\u2019m aware (The US Department of Justice and Microsoft disrupted LummaC2 infostealing-malware through domain seizures, taking down over 2,300 associated domains. The FBI and CISA by AlienVault) Further research necessary.",
          "modified": "2026-02-07T14:04:48.556000",
          "created": "2026-01-08T16:06:18.126000",
          "tags": [
            "levelblue labs",
            "mirai",
            "windows",
            "ck ids",
            "application",
            "network denial",
            "service",
            "contacted",
            "search",
            "unknown",
            "top source",
            "top destination",
            "source source",
            "china as4812",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "enter",
            "udp include",
            "country",
            "unique",
            "unique asns",
            "ip hostname",
            "reverse ip",
            "lookup country",
            "china as17429",
            "taiwan as3462",
            "new caledonia",
            "as18200 office",
            "china as4538",
            "china as9394",
            "india as137654",
            "japan as2514",
            "japan as9365",
            "china as45083",
            "endian",
            "linux",
            "apple",
            "linux subsys",
            "lang c",
            "linenum",
            "lsyms",
            "machine",
            "static",
            "va",
            "os linux",
            "nx",
            "relocs",
            "intel 8038",
            "elf32",
            "malware distribution",
            "domain seizures",
            "infostealing malware",
            "cat-themed domains",
            "gather victim",
            "t1589",
            "t1568",
            "t1590",
            "web protocols",
            "drop resolver",
            "t1568 t1590",
            "show",
            "filehash",
            "md5 add",
            "pulse pulses",
            "copy",
            "affected _and_fixed",
            "thank you"
          ],
          "references": [
            "cat-are-here.ru",
            "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
            "Yara Detections: LZMA",
            "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
            "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
            "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
            "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
            "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
            "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
            "CloudFlare Domain: apple-dns.net",
            "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
            "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
            "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
            "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
            "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
            "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
            "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
            "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
            "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
            "https://view.emails.sonymusicfans.com/Error.aspx",
            "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
            "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click",
            "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
            "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
            "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
            "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
            "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
            "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
            "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Mirai (Windows)",
              "display_name": "Mirai (Windows)",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-10028259-0",
              "display_name": "Unix.Trojan.Mirai-10028259-0",
              "target": null
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981160-0",
              "display_name": "Unix.Trojan.Gafgyt-6981160-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1584.001",
              "name": "Domains",
              "display_name": "T1584.001 - Domains"
            },
            {
              "id": "T1102.001",
              "name": "Dead Drop Resolver",
              "display_name": "T1102.001 - Dead Drop Resolver"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 74,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 1067,
            "URL": 2140,
            "domain": 247,
            "hostname": 674,
            "CVE": 2
          },
          "indicator_count": 4278,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "71 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68dd9423f9208dcc8701e12e",
          "name": "Maktub Locker TOR Status Check \u2022 Cab \\ Drive by( dbi.com) Malicious pic",
          "description": "After 911 told me I was bounced to the Denver, Co Station 5 , located 45 & Peoria in Denver , Colorado , not even close. \nThe phone number changed, only 911 access. Clue: I saw an Amber alert in n target phone when I powered it on. No all notices always turned off. Made a call\non contact list and screen changed to a plain faced interface. \n\nAfter finding a mother foundry link on targets phone I grew curious about a CEO\u2019s strange story of Palantir\u2019s Karp Theil roommate situation in Law School but I could only find one picture on of them on a campus in their late 40\u2019s. He\u2019s African American mixed. The picture of his mother in hacked phone is 215 yo. No information federal oversight as CEO right? Or limited information on crazy hacked device? \n\nClicked on link then OMGness\n\n#whatIfind #onhackeddevice #targeting",
          "modified": "2025-10-31T19:03:21.338000",
          "created": "2025-10-01T20:50:43.002000",
          "tags": [
            "iocs",
            "logo",
            "passive dns",
            "related tags",
            "none google",
            "ipv4",
            "gogle",
            "twitter",
            "x.com",
            "ransomware",
            "fbi \u2019site\u2019",
            "python",
            "cloud",
            "regopenkeyexw",
            "read c",
            "port",
            "destination",
            "cryptexportkey",
            "count read",
            "tor get",
            "malware",
            "write",
            "format",
            "redacted for",
            "server",
            "privacy tech",
            "privacy admin",
            "country",
            "postal code",
            "organization",
            "date",
            "email",
            "code",
            "aaaa",
            "value a",
            "key identifier",
            "v3 serial",
            "number",
            "cus ogoogle",
            "trust",
            "cnwe1 validity",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "maktub",
            "cnc",
            "python-projekt",
            "x post",
            "link",
            "android",
            "iphone",
            "google",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "spawns",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "mitre att",
            "show technique",
            "ck matrix",
            "title",
            "path",
            "hybrid",
            "general",
            "local",
            "form",
            "click",
            "strings",
            "body"
          ],
          "references": [
            "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
            "Entity CLOUD14",
            "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
            "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
            "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
            "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
            "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
            "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
            "Yara Detections: stack_string Alerts: dead_host",
            "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
            "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
            "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Code Virus Ransomware",
              "display_name": "Code Virus Ransomware",
              "target": null
            },
            {
              "id": "AVAST- Win32:Filecoder-AD\\ [Trj]",
              "display_name": "AVAST- Win32:Filecoder-AD\\ [Trj]",
              "target": null
            },
            {
              "id": "CLAMAV - Win.Malware.Cabby-6803812",
              "display_name": "CLAMAV - Win.Malware.Cabby-6803812",
              "target": null
            },
            {
              "id": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "display_name": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "target": "/malware/Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 574,
            "domain": 147,
            "FileHash-MD5": 156,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 539,
            "URL": 982,
            "SSLCertFingerprint": 4,
            "email": 2
          },
          "indicator_count": 2534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "170 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6615d6998eba463f36adf923",
          "name": "hxxps://viz[.]greynoise[.]io/analysis/22fe6389-fe4a-49dc-b343-b6a2feb32864 - 04.04.24 by jwanihad (enriched)",
          "description": "",
          "modified": "2025-06-23T17:53:11.641000",
          "created": "2024-04-10T00:00:25.617000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/789999053bd7022e2d79a887a5f959be573ce57d6c4f3165503438fbd5dd9ad5/graph"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2361,
            "domain": 632,
            "FileHash-SHA256": 644,
            "hostname": 918
          },
          "indicator_count": 4555,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 182,
          "modified_text": "300 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6775b17c488523ee9d290afd",
          "name": "agressive extra",
          "description": "",
          "modified": "2025-03-17T22:57:49.933000",
          "created": "2025-01-01T21:19:56.847000",
          "tags": [],
          "references": [
            "https://sslbl.abuse.ch/blacklist/sslipblacklist_aggressive.rules"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 35208,
            "URL": 79504,
            "domain": 19527,
            "hostname": 28058,
            "CVE": 9
          },
          "indicator_count": 162306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 199,
          "modified_text": "398 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66dfa5a84844f3703fea6b84",
          "name": "Maktub Locker Ransomware",
          "description": "Maktub Locker Ransomware is old, works and arrives to victims like typical ransomware. I .  I'm can't make a valuable contribution regarding link that  populates fbi.gov node without security header. . Tulach -114.114.114.114 is at the center of most of the vulnerabilities I've researched. I've removed Tsara Brashears and name and organizations relating Brian Sabey from pulse. VT Alexo auto populated in tags. Internet search shows he referenced link and 'black suits' I did not research VT-Alexo and I don't know his significance to the Ransomware link [link appears 1st in references]. \nThere has been so much government, healthcare, legal, and law enforcement entanglement and/or/likely impersonation regarding a main issue I've been researching. Lost in this moment...",
          "modified": "2024-10-09T21:01:40.228000",
          "created": "2024-09-10T01:49:28.437000",
          "tags": [
            "axeljg",
            "kulinskiarkadi",
            "ip hostname",
            "reverse ip",
            "united",
            "regopenkeyexw",
            "cryptexportkey",
            "regsetvalueexa",
            "ip address",
            "medium",
            "regdword",
            "t1047",
            "instrumentation",
            "rpcs",
            "high",
            "win32",
            "malware",
            "showing",
            "entries disa",
            "entrypoint",
            "fbi.gov",
            "alexo",
            "germany",
            "united states",
            "brian sabey",
            "thebrotherssabey",
            "alexo virustotal",
            "yara detections",
            "ids detections",
            "contacted",
            "show",
            "medium windows",
            "alerts",
            "maktub locker",
            "tsara brashness dead",
            "aig",
            "soc",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "compiler",
            "vs2008",
            "vs2005",
            "contained",
            "info compiler",
            "products",
            "vs2008 sp1",
            "header intel",
            "name md5",
            "type",
            "language",
            "virus",
            "urls",
            "javascript",
            "b file",
            "files",
            "file type",
            "rich text",
            "format",
            "found",
            "downloads",
            "injection t1055",
            "spawns",
            "t1497 may",
            "https",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "window",
            "get file",
            "check mutex",
            "print debug",
            "get disk",
            "check",
            "enumerate gui",
            "create mutex",
            "query",
            "enumerate",
            "create shortcut",
            "capture",
            "get http",
            "windows nt",
            "request",
            "response",
            "number",
            "algorithm",
            "ja3s",
            "cus cnr3",
            "subject",
            "http requests",
            "samplepath",
            "runtime modules",
            "referrer",
            "threat network",
            "infrastructure",
            "historical ssl",
            "approach",
            "ta413",
            "tibetan targets",
            "vy binh",
            "march",
            "tulach",
            "114.114.114.114",
            "libreoffice.org",
            "as174 cogent",
            "china unknown",
            "china",
            "passive dns",
            "entries",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "twitter",
            "problems",
            "domainabuse",
            "creation date",
            "search",
            "domain",
            "domain name",
            "expiration date",
            "nanjing",
            "date",
            "all search",
            "trojan",
            "trojan features",
            "related pulses",
            "file samples",
            "files matching",
            "sort"
          ],
          "references": [
            "Ransomware\u00bbTrojanDownloader:Win32/Dalexis | FileHash-SHA256  01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
            "Antivirus Detections Win32:Filecoder-AD\\ [Trj] ,  Win.Malware.Cabby-6803812-0 ,  TrojanDownloader:Win32/Dalexis!rfn!rfn",
            "IDS Detections: Maktub Locker TOR Status Check TOR Consensus Data Requested TOR 1.0 Server Key Retrieval Tor Get Server Request TLS Handshake",
            "Domains Contacted: fbi.gov",
            "IP\u2019s Contacted:  104.16.149.244  128.31.0.39  131.188.40.189  14.200.177.98  148.251.79.57",
            "IP\u2019s Contacted: 185.220.100.255  199.249.230.142  199.254.238.52 23.128.248.20  45.58.156.76",
            "tulach.cc| 114.114.114.114 [public1.114dns.com] | thebrotherssabey | bian sabey under multiple WP & DGA domains , various titles , various roles",
            "External Hosts Top Country United States, Germany | IP Hostname: 104.16.149.244: fbi.gov | United States: AS13335 cloudflare",
            "Type Indicator Reason:  IPv4 104.16.149.244 In CDN range: provider=cloudflare  IPv4 131.188.40.189 IP Associated with Tor Exit Nodes",
            "Type Indicator Reason:  IPv4 192.168.56.108 Private IP Address:  IPv4 46.20.35.112 IP Associated with Tor Exit Nodes:  Domain: fbi.gov",
            "PE Anomalies: entropy_based | Yara Detections: Yara Detections stack_string | Stack_String: stack_string E\u000fEEEE\u000fEEEE\u000fEEEE\u000fEEEE\u000fEE\u000fEE\u000fEE\u000fEE\u000f",
            "DISA Entrypoint: call 0x41259b jmp 0x40b3ac int3 int3 int3 int3 int3 int3 int3 int3",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
            "Alerts: dead_host network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http packer_entropy",
            "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters raises_exception",
            "Alerts: queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name",
            "Interesting Strings: http://ns.adobe.com/xap/1.0/mm/ http://ns.adobe.com/xap/1.0/  http://ns.adobe.com/xap/1.0/sType/ResourceRef",
            "Interesting Strings: http://www.w3.org/1999/02/22",
            "Virus: \"ba30376f915afa868763f84299fae5d2.virus.rtf - LibreOffice Writer\"",
            "Cryptographical plain text c\ufffdh\u000f\u00107\ufffd\ufffd1Q\ufffd\u0286\ufffd\u0254E\ufffdW\u0014\ufffd\u0382\ufffd Rw\ufffde\ufffd\ufffd%\u000b\ufffd\ufffd\ufffdreudt\ufffd\ufffd\ufffd",
            "IDS: Matches rule ET JA3 Hash - Possible Malware - Dridex",
            "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 129, 750, 824, 439, 282, 820, 21 , 63, 896, 91, 11, 202, 684 919,31 ,156, 743",
            "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 869, 42, 6, 443, 85, 416, 688, 117, 217, 217, 443, 709, 703, 879, 338, 682",
            "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
            "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
            "IDS:  Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
            "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
            "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
            "IDS: Matches rule (http_inspect) white space before or between HTTP messages Matches rule SURICATA HTTP Request abnormal Content-Encoding",
            "Sigma: Matches rule Failed Code Integrity Checks by Thomas Patzke Matches rule Process Creation Using Sysnative Folder by Max Altgelt",
            "YARA Signature Match - THOR APT Scanner - RULE_AUTHOR: Florian Roth",
            "RULE: MAL_Agent_May20_1 RULE_SET: Livehunt - Default22 Indicators RULE_TYPE: VALHALLA rule feed only \u26a1- RULE_AUTHOR: Florian Roth",
            "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/MAL_Agent_May20_1 DESCRIPTION:",
            "Detects malware used in activity noticed  05/2020 likely related to Chinese actor",
            "REFERENCE: ACSC IOCs May 2020 pivoting RULE_AUTHOR: Florian Roth",
            "https://www.nextron-systems.com/notes-on-virustotal-matches/",
            "114.114.114.114 IDS Detections DYNAMIC_DNS Query to a *.ns1.name Domain Query to a *.top domain - Likely Hostile Observed DNS Query to .work",
            "IP 114.114.114.114 Antivirus Detections: !#SIGATTR:IEProxyChange ,  ALF:Backdoor:Win64/Meterpreter.AB!MTB ,",
            "IP 114.114.114.114 Antivirus Detections: ALF:PUA:Block:VrBrothers.R!MTB ,  ALF:Trojan:MSIL/AgentTesla.KM ,  ALFPER:RefLoadApiHash ,",
            "IP 114.114.114.114 Antivirus Detections: Backdoor:Linux/Dofloo.A!MTB ,  Backdoor:Linux/Gafgyt.AF!MTB ,  Can't access file ,",
            "IP 114.114.114.114 Antivirus Detections: Trojan:Win32/Magania.DSK!MTB , TEL:SIGATTR:CreateRemoteThread",
            "IP 114.114.114.114 Domain 114dns.com: PegasusPlus",
            "Emails: pegasusplus@gmail.com Name: Zhao Zhenping Name Servers: NS1000.114DNS.COM Org: Nanjing XinFeng Network Technologies, Inc.",
            "Address:\tRoom 301, Building 3B, Startup park, High Tech park, Shiyang Road 56, Baixia District, Nanjing, Jiangsu, China City nan jing shi Country",
            "https://blog.malwarebytes.org/intelligence/2016/03/maktub-locker-beautiful-and-dangerous/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "China"
          ],
          "malware_families": [
            {
              "id": "Maktub Locker",
              "display_name": "Maktub Locker",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "display_name": "TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "target": "/malware/TrojanDownloader:Win32/Dalexis!rfn!rfn"
            },
            {
              "id": "Trojan:Win32/Magania",
              "display_name": "Trojan:Win32/Magania",
              "target": "/malware/Trojan:Win32/Magania"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [
            "Government",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 182,
            "FileHash-SHA1": 199,
            "FileHash-SHA256": 2383,
            "domain": 395,
            "URL": 1382,
            "hostname": 699,
            "email": 2,
            "CVE": 1
          },
          "indicator_count": 5243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "557 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a901fe2dbea9024b3d614",
          "name": "Black Tech",
          "description": "Found in a malicious Apple iTunes link. Lists several independent artists. Music \"producer\" is potentially highly dependent on use of AI generated instrumentation and conception.  Hacking seems to target a single target and associates.",
          "modified": "2024-09-24T00:01:38.502000",
          "created": "2023-10-14T12:57:03.183000",
          "tags": [
            "referrer",
            "historical ssl",
            "ssl certificate",
            "whois record",
            "whois ssl",
            "whois",
            "historical",
            "siblings parent",
            "network",
            "number",
            "label shanghai",
            "blue cloud",
            "ltd regional",
            "apnic country",
            "cn continent",
            "algorithm",
            "data",
            "v3 serial",
            "cus cndigicert",
            "basic rsa",
            "cn ca",
            "g2 odigicert",
            "inc validity",
            "oshanghai blue",
            "road",
            "beijing country",
            "beijing",
            "please",
            "apnic person",
            "cn phone",
            "whois lookup",
            "bluecloud descr",
            "shanghai blue",
            "ltd descr",
            "cnnic",
            "whois lookups",
            "updated date",
            "apnic netname",
            "beijing abusec",
            "abuse cnniccn",
            "liu registrant",
            "country",
            "dns replication",
            "date",
            "domain",
            "first",
            "blacklist https",
            "heur",
            "html",
            "malware",
            "alexa top",
            "site",
            "filerepmetagen",
            "suspected",
            "adware",
            "cisco umbrella",
            "malware site",
            "win64",
            "opencandy",
            "cleaner",
            "artemis",
            "iframe",
            "agent",
            "unsafe",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "genkryptik",
            "exploit",
            "presenoker",
            "filetour",
            "conduit",
            "wacatac",
            "softcnapp",
            "xtrat",
            "cve201711882",
            "memscan",
            "phishing",
            "maltiverse",
            "zbot",
            "webtoolbar",
            "trojanspy",
            "million",
            "united",
            "phishing site",
            "malicious site",
            "proxy",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "safe site",
            "team",
            "fusioncore",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "alexa",
            "adposhel",
            "installpack",
            "xrat",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "download",
            "gamehack",
            "verdict",
            "falcon sandbox",
            "pattern match",
            "show",
            "file",
            "indicator",
            "ascii text",
            "appdata",
            "mitre att",
            "et tor",
            "known tor",
            "severity",
            "hybrid",
            "general",
            "misc attack",
            "beginstring",
            "script",
            "relayrouter",
            "exit",
            "node traffic",
            "null",
            "error",
            "unknown",
            "span",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "click",
            "strings",
            "meta",
            "anonymizer",
            "team proxy",
            "host",
            "control server",
            "meterpreter",
            "dnspionage",
            "filerepmalware",
            "fakealert",
            "pony",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "patcher",
            "adload",
            "webcompanion",
            "seraph",
            "downloader",
            "generic",
            "dapato",
            "redline stealer",
            "beach research",
            "blacklist http",
            "generic malware",
            "fakedout threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "bundled",
            "dropped",
            "contacted",
            "most malicious",
            "server",
            "parent parent"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2449,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 3441,
            "URL": 2044,
            "domain": 258,
            "hostname": 1100,
            "CIDR": 1,
            "email": 4,
            "CVE": 37
          },
          "indicator_count": 9551,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "572 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bca8fcbe62297d71b47c33",
          "name": "Ragnar Locker",
          "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
          "modified": "2024-03-03T08:00:03.432000",
          "created": "2024-02-02T08:34:04.425000",
          "tags": [
            "referrer",
            "contacted",
            "whois record",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "execution",
            "historical ssl",
            "red team",
            "gang breached",
            "agent tesla",
            "redline stealer",
            "metro",
            "android",
            "urls url",
            "files",
            "kgs0",
            "kls0",
            "orgtechhandle",
            "orgtechref",
            "orgabusehandle",
            "orgdnshandle",
            "orgdnsref",
            "whois lookup",
            "netrange",
            "nethandle",
            "net108",
            "net1080000",
            "communicating",
            "urls http",
            "ransomware gang",
            "breached",
            "team",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "psiusa",
            "domain robot",
            "porkbun llc",
            "keysystems gmbh",
            "csc corporate",
            "domains",
            "domain name",
            "network pty",
            "tucows",
            "com laude",
            "dynadot inc"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8354,
            "FileHash-MD5": 104,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 2711,
            "CIDR": 5,
            "CVE": 6,
            "domain": 1489,
            "hostname": 3058,
            "email": 5
          },
          "indicator_count": 15813,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fa5d085f721612e434395",
          "name": "Fali Attack \u2022 Tor Server \u2022 Apple Private Data Collection\u2192nr-data.net",
          "description": "Link below reads: OCTOSEEK URL ADD TO PULSE (http://199.249.230.162/tor/server/fp/f9674f45a25caa977e7b872807e0a070c121f5fa) FALSE. What the government allows, even if you have 'nothing to hide.'  Named target  in this pulse: Tsara Brashears isn't a criminal/suspect, is a subject aka target or topic. By accounts a physical therapist, working under quasi government umbrella, allegedly, injouriously SA'd target. Privileges that any accusation can illicit  a campaign of humiliation and spying.  Ridiculously obvious attack. Pornhub subsidiary  used to crack passwords , transactional government relationships w/Microsoft, Bing, Apple,, Assurant. Monitoring, bot networks, hidden cameras, reported, ignored threats, uninvestigated harm , intimidation, and malvertizing. The privilege abusers hack recklessly, exposing others. Government privilege accessors  systematically , openly abuse target in silencing effort. Avoidance of media exposure and financial consequence.",
          "modified": "2023-12-11T12:03:53.533000",
          "created": "2023-11-11T16:03:28.522000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "urls",
            "win64",
            "win32",
            "as62744",
            "backdoor",
            "dangeroussig",
            "ipv4",
            "ssl certificate",
            "dropped",
            "contacted",
            "contacted urls",
            "anlise",
            "apple ios",
            "collection",
            "fali malicious",
            "whois whois",
            "whois record",
            "hacktool",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "ascii text",
            "indicator",
            "ck id",
            "date",
            "unknown",
            "error",
            "generator",
            "critical",
            "refresh",
            "body",
            "span",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "proxy avoidance",
            "anonymizers",
            "hallrender.com",
            "mark sabey",
            "spyware",
            "monitoring",
            "dumping",
            "hacking",
            "brian sabey",
            "threat",
            "Tsara brashears",
            "pulse as16509",
            "mirai"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/ee534a0e8a8bc013fadef020f518d44925b2adf0126444aee53b7a51aadfcb7a/654f6940ec2068706b0ae5ca",
            "Domain   nr-data.net                                                   (Apple Private Data Collection)",
            "Hostname www.bing.com                                         (pattern match)",
            "URL https://assets.msn.com/bundles/v1/homePage/latest/midlevel/vendors.ef7dde432bed42c1b7db.js.            (t .map \"pattern match\")",
            "Hostname www.pornhub.com                                (password cracker)",
            "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "Hostname vortex-nlb-http2-fed-us-taut-purple.nr-data.net",
            "URL   http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "FileHash-MD5 879623feffedf5672dffc85c269af125",
            "img-prod-cms-rt-microsoft-com.akamaized.net  (img-prod-cm Nagano east amazonaws)",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=  \t\t   (nr-data.net email collection contractual agreement)",
            "Hostname www.assurant.com                     (nr- data email collection from apple devices)",
            "http://url3308.macorva.com/asm/UNSUBSCRIBE/?user_id=10055259&data=bQ0N-GNp87vailMH8NcX8hVikM6oRFcaYffHPXNvHhxoMDAwdTAwMIZgp6VEcimR2OR6-FgE5LbQmvMKgBcNzfKlzFUlyGhihCTfgGNhqBwYspOmdyExodXueDIXSrpmprp7qqmciBoXxvis5p6MnzhFBM5DSEXvhwy8DunkXxGDBX-Jps3Ihyo3TwAwGKJrlBnUc9b0m9OrG0Gnn8WUnB94unMY8ZMOgaCblwprg85sSdpRgipzAMyP_KxiQKceH-blAFTSIxL5MCSDStpmbiQZ4hVBNMKVaD7KsxSMie09qyTXMdiTsBZv57uwBpGLwpsKyNyJRNDag3flmayRklZ3XkMkhxm8epKkbxiASkjL8XqOpRh1MYS92ivMoL0YvpNeaKc_svs=",
            "URL http://movies.waploaded.ng/search/Horse-Sex-Women.html                     (",
            "https://ftp.zedz.net/vir/Trojan-PSW.HTML.YahooLogon/",
            "time-a.nist.gov                     (DNS ipify Control)",
            "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Request\t2008113",
            "https://otx.alienvault.com/indicator/url/http://blacklist1.dnsblocklist.com",
            "https://otx.alienvault.com/indicator/url/http://cinefest.com/en/submissions/",
            "hostnameobject.prototype.hasownproperty.call.     (API commands to newly acquired property of target and family)",
            "e.call    (API call invasion)",
            "t.call    (targets communication storage)",
            "https://app.call-em-all.com/broadcasts/all/login?redirect=/broadcasts/all",
            "http://call-em-all.com/DeleteNumberFromBroadcast.       (Brutes)",
            "http://call-em-all.com/AddNumbersToBroadcast",
            "http://call-em-all.com/AddPersonsToList",
            "http://call-em-all.com/GetAccountKeywords",
            "http://call-em-all.com/CheckPhoneNumber",
            "http://call-em-all.com/GetSMSOptIns",
            "http://call-em-all.com/UpdateAccountInfo",
            "http://call-em-all.com/InsertCustomCall",
            "http://call-em-all.com/GetSchedules",
            "ec2-35-161-55-221.us-west-2.compute.amazonaws.com.     (Boardman, Oregon)",
            "Detections Potential SSH Scan OUTBOUND",
            "Tor Get Server Request",
            "monitoring.akhavan.pro"
          ],
          "public": 1,
          "adversary": "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Reques",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan X",
              "display_name": "Trojan X",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Konus.A",
              "display_name": "Backdoor:Win32/Konus.A",
              "target": "/malware/Backdoor:Win32/Konus.A"
            },
            {
              "id": "Win.Malware.Ulise-9886066-0",
              "display_name": "Win.Malware.Ulise-9886066-0",
              "target": null
            },
            {
              "id": "Win32:DangerousSig\\ [Trj]",
              "display_name": "Win32:DangerousSig\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win64:TrojanX-gen\\ [Trj]",
              "display_name": "Win64:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Fali",
              "display_name": "Fali",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ELF:Mirai-SJ\\ Trj",
              "display_name": "ELF:Mirai-SJ\\ Trj",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1573.002",
              "name": "Asymmetric Cryptography",
              "display_name": "T1573.002 - Asymmetric Cryptography"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 64,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 2276,
            "URL": 5992,
            "hostname": 1025,
            "domain": 330,
            "CVE": 1
          },
          "indicator_count": 9901,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654af6cf6bee02fafb173522",
          "name": "Infected.WebPage",
          "description": "Auto populated statement:\n\"Researchers\" have been analysing more than 1,000 samples of malware in an attempt to identify and identify the most common types of cyber-crime and its impact on the public and private networks.\"\nBehavesLike.HTML.Redirector",
          "modified": "2023-12-08T01:04:05.677000",
          "created": "2023-11-08T02:47:43.205000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "new pulse",
            "existing pulse",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de summary",
            "london",
            "united kingdom",
            "google safe",
            "europelondon",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "date",
            "servers",
            "hashes files",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "mitre att",
            "null",
            "unknown",
            "span",
            "error",
            "class",
            "generator",
            "critical",
            "body",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "refresh",
            "tools",
            "contacted",
            "whois record",
            "whois whois",
            "execution",
            "resolutions",
            "communicating",
            "referrer",
            "pe resource",
            "bundled",
            "flawedammyy",
            "metamorfo",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "filerepmalware",
            "heur",
            "cisco umbrella",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "malicious site",
            "malware site",
            "phishing site",
            "artemis",
            "outbreak",
            "dropper",
            "unsafe",
            "trojanx",
            "phishing",
            "agent",
            "installcore",
            "acint",
            "conduit",
            "iobit",
            "mediaget",
            "crack",
            "mimikatz",
            "alexa",
            "rostpay",
            "installpack",
            "predator",
            "dbatloader",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "trojan",
            "irata",
            "utorrent",
            "generic",
            "yakes",
            "adposhel",
            "crypt",
            "wacatac",
            "riskware",
            "blacknet rat",
            "stealer",
            "xrat",
            "downldr",
            "malicious",
            "trojanspy",
            "webtoolbar",
            "maltiverse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 112,
            "FileHash-SHA256": 3390,
            "URL": 2779,
            "CIDR": 1,
            "hostname": 1228,
            "domain": 698,
            "CVE": 5
          },
          "indicator_count": 8328,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "863 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d2a2e6cbc20fac8504fe5",
          "name": "Infected.WebPage",
          "description": "",
          "modified": "2023-12-08T01:04:05.677000",
          "created": "2023-11-09T18:51:26.957000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "new pulse",
            "existing pulse",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de summary",
            "london",
            "united kingdom",
            "google safe",
            "europelondon",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "date",
            "servers",
            "hashes files",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "mitre att",
            "null",
            "unknown",
            "span",
            "error",
            "class",
            "generator",
            "critical",
            "body",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "refresh",
            "tools",
            "contacted",
            "whois record",
            "whois whois",
            "execution",
            "resolutions",
            "communicating",
            "referrer",
            "pe resource",
            "bundled",
            "flawedammyy",
            "metamorfo",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "filerepmalware",
            "heur",
            "cisco umbrella",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "malicious site",
            "malware site",
            "phishing site",
            "artemis",
            "outbreak",
            "dropper",
            "unsafe",
            "trojanx",
            "phishing",
            "agent",
            "installcore",
            "acint",
            "conduit",
            "iobit",
            "mediaget",
            "crack",
            "mimikatz",
            "alexa",
            "rostpay",
            "installpack",
            "predator",
            "dbatloader",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "trojan",
            "irata",
            "utorrent",
            "generic",
            "yakes",
            "adposhel",
            "crypt",
            "wacatac",
            "riskware",
            "blacknet rat",
            "stealer",
            "xrat",
            "downldr",
            "malicious",
            "trojanspy",
            "webtoolbar",
            "maltiverse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654af6cf6bee02fafb173522",
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 112,
            "FileHash-SHA256": 3390,
            "URL": 2779,
            "CIDR": 1,
            "hostname": 1228,
            "domain": 698,
            "CVE": 5
          },
          "indicator_count": 8328,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "863 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654af6ca6354bcdb604e2e85",
          "name": "Infected.WebPage",
          "description": "Auto populated statement:\n\"Researchers\" have been analysing more than 1,000 samples of malware in an attempt to identify and identify the most common types of cyber-crime and its impact on the public and private networks.\"\nBehavesLike.HTML.Redirector",
          "modified": "2023-12-08T01:04:05.677000",
          "created": "2023-11-08T02:47:38.907000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "new pulse",
            "existing pulse",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de summary",
            "london",
            "united kingdom",
            "google safe",
            "europelondon",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "date",
            "servers",
            "hashes files",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "mitre att",
            "null",
            "unknown",
            "span",
            "error",
            "class",
            "generator",
            "critical",
            "body",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "refresh",
            "tools",
            "contacted",
            "whois record",
            "whois whois",
            "execution",
            "resolutions",
            "communicating",
            "referrer",
            "pe resource",
            "bundled",
            "flawedammyy",
            "metamorfo",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "filerepmalware",
            "heur",
            "cisco umbrella",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "malicious site",
            "malware site",
            "phishing site",
            "artemis",
            "outbreak",
            "dropper",
            "unsafe",
            "trojanx",
            "phishing",
            "agent",
            "installcore",
            "acint",
            "conduit",
            "iobit",
            "mediaget",
            "crack",
            "mimikatz",
            "alexa",
            "rostpay",
            "installpack",
            "predator",
            "dbatloader",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "trojan",
            "irata",
            "utorrent",
            "generic",
            "yakes",
            "adposhel",
            "crypt",
            "wacatac",
            "riskware",
            "blacknet rat",
            "stealer",
            "xrat",
            "downldr",
            "malicious",
            "trojanspy",
            "webtoolbar",
            "maltiverse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 112,
            "FileHash-SHA256": 3390,
            "URL": 2779,
            "CIDR": 1,
            "hostname": 1228,
            "domain": 698,
            "CVE": 5
          },
          "indicator_count": 8328,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "863 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a9123acb8410d1158f8a",
          "name": "DNSpionage",
          "description": "",
          "modified": "2023-12-06T17:02:10.861000",
          "created": "2023-12-06T17:02:10.861000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 27,
            "FileHash-SHA256": 3307,
            "hostname": 1083,
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "domain": 255,
            "URL": 1933,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a90bc683765a535061dc",
          "name": "27 CVE Talley | GameHack l Beach Research",
          "description": "",
          "modified": "2023-12-06T17:02:03.119000",
          "created": "2023-12-06T17:02:03.119000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 27,
            "FileHash-SHA256": 3307,
            "hostname": 1083,
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "domain": 255,
            "URL": 1933,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a903fc0836f148fa45c9",
          "name": "Oshanghai Blue",
          "description": "",
          "modified": "2023-12-06T17:01:55.465000",
          "created": "2023-12-06T17:01:55.465000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 27,
            "FileHash-SHA256": 3307,
            "hostname": 1083,
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "domain": 255,
            "URL": 1933,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8fb83452e1699674c37",
          "name": "Black Tech",
          "description": "",
          "modified": "2023-12-06T17:01:47.488000",
          "created": "2023-12-06T17:01:47.488000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 27,
            "FileHash-SHA256": 3307,
            "hostname": 1083,
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "domain": 255,
            "URL": 1933,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7dda4ef145116f1593a",
          "name": "Packed.VMProt/ Packed.VMProtect Apple|  iOS | Mac attack techapply.com",
          "description": "",
          "modified": "2023-12-06T16:57:01.831000",
          "created": "2023-12-06T16:57:01.831000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 5,
            "hostname": 551,
            "FileHash-SHA256": 650,
            "FileHash-MD5": 425,
            "FileHash-SHA1": 224,
            "URL": 1019,
            "domain": 485,
            "email": 2,
            "FilePath": 2
          },
          "indicator_count": 3363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7d867bfb30b452b94d0",
          "name": "Packed.VMProt/ Packed.VMProtect Apple|  iOS | Mac attack techapply.com",
          "description": "",
          "modified": "2023-12-06T16:56:56.522000",
          "created": "2023-12-06T16:56:56.522000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 5,
            "hostname": 551,
            "FileHash-SHA256": 650,
            "FileHash-MD5": 425,
            "FileHash-SHA1": 224,
            "URL": 1019,
            "domain": 485,
            "email": 2,
            "FilePath": 2
          },
          "indicator_count": 3363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657095e8a38dccaa9c0dfd29",
          "name": "escaneo spam, bots y anonimizacion din\u00e1mica diciembre",
          "description": "",
          "modified": "2023-12-06T15:40:24.674000",
          "created": "2023-12-06T15:40:24.674000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 615,
            "CVE": 2,
            "domain": 553,
            "hostname": 915,
            "URL": 2004
          },
          "indicator_count": 4089,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1ffb074d89724cb81371",
          "name": "Tracker and Botnet campaign - Canto XXVI",
          "description": "",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-30T03:16:11.181000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653323de61317f6ca7a3e875",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65331eeded285a25c31d63a4",
          "name": "Tracking and Botnet campaign",
          "description": "US attackers making an exit by dumping to my devices & spreading to various other unsuspecting?\nRevenge for researching? Dumping to make it hard to implicate a single source. \nDump of Tsara Brashears and other adult content , malvertizing by a cyber stalker campaigners. As reported previously, entered my device and took control. Evidence pulled from a device while attack in progress. Device read Michigan, shopping, advertising, news, etc. Location not associated with any failed privacy controls on devices listing other locations.\nI listed a few IOC's Dumped to device in references. \nDump was continuous. Device modification for storage, new systems interface created upon device update. Moderete byte load per minute. Example 227 KB per minute. Prism command line tool\nChina foolish enough to implicate themselves for unclear crimes against American citizens? If an alleged crime against a target was allegedly committed in US someone is silencing her big time. There are a few other names as well. Targets?",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-21T00:44:29.344000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653323d24f9946946c804be4",
          "name": "Tracker and Botnet campaign  - Canto XXVI",
          "description": "Sounds crazy made up. This is an expensive campaign. Talented, lost individuals.\nI'm naming this campaign.\n'Canto XXVI'  Bolgia 8 \u2013 Counsellors of Fraud\nThat's where they'll return.",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-21T01:05:22.903000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580ba704bae549b90948b5",
          "name": "Tracker and Botnet campaign - Canto XXVI",
          "description": "",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-11-18T00:56:07.651000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653f1ffb074d89724cb81371",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653323de61317f6ca7a3e875",
          "name": "Tracker and Botnet campaign  - Canto XXVI",
          "description": "Sounds crazy made up. This is an expensive campaign. Talented, lost individuals.\nI'm naming this campaign.\n'Canto XXVI'  Bolgia 8 \u2013 Counsellors of Fraud\nThat's where they'll return.",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-21T01:05:34.166000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6533b20cf4ad384a0193c655",
          "name": "114.114.114.114 Tracking | Botnet | Malvertizing ",
          "description": "",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-21T11:12:12.005000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653323d24f9946946c804be4",
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f205bac4b92f025125962",
          "name": "Tracker and Botnet campaign - Canto XXVI",
          "description": "",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-30T03:17:47.051000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653323d24f9946946c804be4",
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f200c20e12f03f749c403",
          "name": "114.114.114.114 Tracking | Botnet | Malvertizing",
          "description": "",
          "modified": "2023-11-19T00:04:57.528000",
          "created": "2023-10-30T03:16:28.252000",
          "tags": [
            "contacted",
            "tsara brashears",
            "whois record",
            "whois whois",
            "threat roundup",
            "december",
            "execution",
            "referrer",
            "pe resource",
            "remcos",
            "malware",
            "quasar",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "awful",
            "open",
            "korplug",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "ursnif",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "beginstring",
            "script",
            "segoe ui",
            "null",
            "error",
            "unknown",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "xiongmao group",
            "district",
            "nanjing",
            "china country",
            "beijing",
            "please",
            "apnic person",
            "road",
            "china phone",
            "whois lookup",
            "cnnic",
            "dns replication",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "type name",
            "android",
            "win32 dll",
            "cyber criminals",
            "cyber stalking",
            "cyber warfare",
            "framing",
            "tulach.cc",
            "exploit_source",
            "scanning_host",
            "phishing",
            "adware",
            "command_and_control",
            "C2",
            "technology",
            "virustotal xn",
            "technology xn",
            "rich text",
            "format po",
            "jyoti cnc",
            "detection list",
            "blacklist",
            "noname057",
            "proxy",
            "prism.exe",
            "password cracker",
            "skynet",
            "malvertizing",
            "spyware",
            "colorado",
            "arizona",
            "prism command line tool",
            "keyloggers",
            "apple",
            "I'm being followed",
            "threats",
            "sha256",
            "osint",
            "vmware",
            "gpt",
            "nginx",
            "piracy",
            "intellectual property",
            "spammer",
            "honeypot",
            "tracker",
            "tracking campaign",
            "Botnet campaign"
          ],
          "references": [
            "114.114.1114.114",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
            "wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
            "www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
            "a-poster.info                 [tagging tool]",
            "https://tulach.cc/    phishing | Proxy | Skynet",
            "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
            "20.99.186.246               exploit_source",
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
            "1.62.64.108                  malware_hosting",
            "110.249.196.101.          malware_hosting",
            "CVE-2022-26134",
            "www.anyxxxtube.net               prism.exe",
            "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
            "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
            "https://twitter.com/               catapult spider/spider",
            "nr-data.net                                 Private Apple data collection",
            "tv.apple.com                               Apple hacking",
            "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
            "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
            "itunes.apple.com.                     [https:///app/apple-store",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
            "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
            "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
            "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
            "199.249.230.74            traffic group 78",
            "https://gpt.ocloo.cn/auth",
            "vmwarevmc.com",
            "http://karnalketo.com/sound-found                             error code 432      server nginx",
            "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
            "64.190.63.136        Malicious. IP: Sedo GmbH",
            "www.sweetheartvideo.com      Tracking and Botnet campaign"
          ],
          "public": 1,
          "adversary": "[Unnamed US Teams and Hacker group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Korplug",
              "display_name": "Korplug",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Colibri Loader",
              "display_name": "Colibri Loader",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Ursnif - S0386",
              "display_name": "Ursnif - S0386",
              "target": null
            },
            {
              "id": "Virus:DOS/Nanjing",
              "display_name": "Virus:DOS/Nanjing",
              "target": "/malware/Virus:DOS/Nanjing"
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Virus:WM/Look",
              "display_name": "Virus:WM/Look",
              "target": "/malware/Virus:WM/Look"
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "ketogenic switch",
              "display_name": "ketogenic switch",
              "target": null
            },
            {
              "id": "BitcoinAussie",
              "display_name": "BitcoinAussie",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6533b20cf4ad384a0193c655",
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 173,
            "FileHash-SHA1": 166,
            "FileHash-SHA256": 2841,
            "URL": 6670,
            "CVE": 4,
            "domain": 684,
            "hostname": 1930,
            "CIDR": 2,
            "email": 3
          },
          "indicator_count": 12473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "882 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f19afc40e663452f60260",
          "name": "DNSpionage",
          "description": "",
          "modified": "2023-11-13T12:00:59.446000",
          "created": "2023-10-30T02:49:19.586000",
          "tags": [
            "referrer",
            "historical ssl",
            "ssl certificate",
            "whois record",
            "whois ssl",
            "whois",
            "historical",
            "siblings parent",
            "network",
            "number",
            "label shanghai",
            "blue cloud",
            "ltd regional",
            "apnic country",
            "cn continent",
            "algorithm",
            "data",
            "v3 serial",
            "cus cndigicert",
            "basic rsa",
            "cn ca",
            "g2 odigicert",
            "inc validity",
            "oshanghai blue",
            "road",
            "beijing country",
            "beijing",
            "please",
            "apnic person",
            "cn phone",
            "whois lookup",
            "bluecloud descr",
            "shanghai blue",
            "ltd descr",
            "cnnic",
            "whois lookups",
            "updated date",
            "apnic netname",
            "beijing abusec",
            "abuse cnniccn",
            "liu registrant",
            "country",
            "dns replication",
            "date",
            "domain",
            "first",
            "blacklist https",
            "heur",
            "html",
            "malware",
            "alexa top",
            "site",
            "filerepmetagen",
            "suspected",
            "adware",
            "cisco umbrella",
            "malware site",
            "win64",
            "opencandy",
            "cleaner",
            "artemis",
            "iframe",
            "agent",
            "unsafe",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "genkryptik",
            "exploit",
            "presenoker",
            "filetour",
            "conduit",
            "wacatac",
            "softcnapp",
            "xtrat",
            "cve201711882",
            "memscan",
            "phishing",
            "maltiverse",
            "zbot",
            "webtoolbar",
            "trojanspy",
            "million",
            "united",
            "phishing site",
            "malicious site",
            "proxy",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "safe site",
            "team",
            "fusioncore",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "alexa",
            "adposhel",
            "installpack",
            "xrat",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "download",
            "gamehack",
            "verdict",
            "falcon sandbox",
            "pattern match",
            "show",
            "file",
            "indicator",
            "ascii text",
            "appdata",
            "mitre att",
            "et tor",
            "known tor",
            "severity",
            "hybrid",
            "general",
            "misc attack",
            "beginstring",
            "script",
            "relayrouter",
            "exit",
            "node traffic",
            "null",
            "error",
            "unknown",
            "span",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "click",
            "strings",
            "meta",
            "anonymizer",
            "team proxy",
            "host",
            "control server",
            "meterpreter",
            "dnspionage",
            "filerepmalware",
            "fakealert",
            "pony",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "patcher",
            "adload",
            "webcompanion",
            "seraph",
            "downloader",
            "generic",
            "dapato",
            "redline stealer",
            "beach research",
            "blacklist http",
            "generic malware",
            "fakedout threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "bundled",
            "dropped",
            "contacted",
            "most malicious",
            "server",
            "parent parent"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652a9637ba159a3febc414c4",
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "FileHash-SHA256": 3307,
            "URL": 1933,
            "domain": 255,
            "hostname": 1083,
            "CIDR": 1,
            "email": 4,
            "CVE": 27
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a9637ba159a3febc414c4",
          "name": "DNSpionage",
          "description": "",
          "modified": "2023-11-13T12:00:59.446000",
          "created": "2023-10-14T13:23:03.558000",
          "tags": [
            "referrer",
            "historical ssl",
            "ssl certificate",
            "whois record",
            "whois ssl",
            "whois",
            "historical",
            "siblings parent",
            "network",
            "number",
            "label shanghai",
            "blue cloud",
            "ltd regional",
            "apnic country",
            "cn continent",
            "algorithm",
            "data",
            "v3 serial",
            "cus cndigicert",
            "basic rsa",
            "cn ca",
            "g2 odigicert",
            "inc validity",
            "oshanghai blue",
            "road",
            "beijing country",
            "beijing",
            "please",
            "apnic person",
            "cn phone",
            "whois lookup",
            "bluecloud descr",
            "shanghai blue",
            "ltd descr",
            "cnnic",
            "whois lookups",
            "updated date",
            "apnic netname",
            "beijing abusec",
            "abuse cnniccn",
            "liu registrant",
            "country",
            "dns replication",
            "date",
            "domain",
            "first",
            "blacklist https",
            "heur",
            "html",
            "malware",
            "alexa top",
            "site",
            "filerepmetagen",
            "suspected",
            "adware",
            "cisco umbrella",
            "malware site",
            "win64",
            "opencandy",
            "cleaner",
            "artemis",
            "iframe",
            "agent",
            "unsafe",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "genkryptik",
            "exploit",
            "presenoker",
            "filetour",
            "conduit",
            "wacatac",
            "softcnapp",
            "xtrat",
            "cve201711882",
            "memscan",
            "phishing",
            "maltiverse",
            "zbot",
            "webtoolbar",
            "trojanspy",
            "million",
            "united",
            "phishing site",
            "malicious site",
            "proxy",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "safe site",
            "team",
            "fusioncore",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "alexa",
            "adposhel",
            "installpack",
            "xrat",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "download",
            "gamehack",
            "verdict",
            "falcon sandbox",
            "pattern match",
            "show",
            "file",
            "indicator",
            "ascii text",
            "appdata",
            "mitre att",
            "et tor",
            "known tor",
            "severity",
            "hybrid",
            "general",
            "misc attack",
            "beginstring",
            "script",
            "relayrouter",
            "exit",
            "node traffic",
            "null",
            "error",
            "unknown",
            "span",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "click",
            "strings",
            "meta",
            "anonymizer",
            "team proxy",
            "host",
            "control server",
            "meterpreter",
            "dnspionage",
            "filerepmalware",
            "fakealert",
            "pony",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "patcher",
            "adload",
            "webcompanion",
            "seraph",
            "downloader",
            "generic",
            "dapato",
            "redline stealer",
            "beach research",
            "blacklist http",
            "generic malware",
            "fakedout threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "bundled",
            "dropped",
            "contacted",
            "most malicious",
            "server",
            "parent parent"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652a9441becbdf690c095816",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "FileHash-SHA256": 3307,
            "URL": 1933,
            "domain": 255,
            "hostname": 1083,
            "CIDR": 1,
            "email": 4,
            "CVE": 27
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a9441becbdf690c095816",
          "name": "27 CVE Talley | GameHack l Beach Research",
          "description": "",
          "modified": "2023-11-13T12:00:59.446000",
          "created": "2023-10-14T13:14:41.530000",
          "tags": [
            "referrer",
            "historical ssl",
            "ssl certificate",
            "whois record",
            "whois ssl",
            "whois",
            "historical",
            "siblings parent",
            "network",
            "number",
            "label shanghai",
            "blue cloud",
            "ltd regional",
            "apnic country",
            "cn continent",
            "algorithm",
            "data",
            "v3 serial",
            "cus cndigicert",
            "basic rsa",
            "cn ca",
            "g2 odigicert",
            "inc validity",
            "oshanghai blue",
            "road",
            "beijing country",
            "beijing",
            "please",
            "apnic person",
            "cn phone",
            "whois lookup",
            "bluecloud descr",
            "shanghai blue",
            "ltd descr",
            "cnnic",
            "whois lookups",
            "updated date",
            "apnic netname",
            "beijing abusec",
            "abuse cnniccn",
            "liu registrant",
            "country",
            "dns replication",
            "date",
            "domain",
            "first",
            "blacklist https",
            "heur",
            "html",
            "malware",
            "alexa top",
            "site",
            "filerepmetagen",
            "suspected",
            "adware",
            "cisco umbrella",
            "malware site",
            "win64",
            "opencandy",
            "cleaner",
            "artemis",
            "iframe",
            "agent",
            "unsafe",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "genkryptik",
            "exploit",
            "presenoker",
            "filetour",
            "conduit",
            "wacatac",
            "softcnapp",
            "xtrat",
            "cve201711882",
            "memscan",
            "phishing",
            "maltiverse",
            "zbot",
            "webtoolbar",
            "trojanspy",
            "million",
            "united",
            "phishing site",
            "malicious site",
            "proxy",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "safe site",
            "team",
            "fusioncore",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "alexa",
            "adposhel",
            "installpack",
            "xrat",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "download",
            "gamehack",
            "verdict",
            "falcon sandbox",
            "pattern match",
            "show",
            "file",
            "indicator",
            "ascii text",
            "appdata",
            "mitre att",
            "et tor",
            "known tor",
            "severity",
            "hybrid",
            "general",
            "misc attack",
            "beginstring",
            "script",
            "relayrouter",
            "exit",
            "node traffic",
            "null",
            "error",
            "unknown",
            "span",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "click",
            "strings",
            "meta",
            "anonymizer",
            "team proxy",
            "host",
            "control server",
            "meterpreter",
            "dnspionage",
            "filerepmalware",
            "fakealert",
            "pony",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "patcher",
            "adload",
            "webcompanion",
            "seraph",
            "downloader",
            "generic",
            "dapato",
            "redline stealer",
            "beach research",
            "blacklist http",
            "generic malware",
            "fakedout threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "bundled",
            "dropped",
            "contacted",
            "most malicious",
            "server",
            "parent parent"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652a901fe2dbea9024b3d614",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "FileHash-SHA256": 3307,
            "URL": 1933,
            "domain": 255,
            "hostname": 1083,
            "CIDR": 1,
            "email": 4,
            "CVE": 27
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a913f48809612f1bd7deb",
          "name": "Oshanghai Blue ",
          "description": "",
          "modified": "2023-11-13T12:00:59.446000",
          "created": "2023-10-14T13:01:51.164000",
          "tags": [
            "referrer",
            "historical ssl",
            "ssl certificate",
            "whois record",
            "whois ssl",
            "whois",
            "historical",
            "siblings parent",
            "network",
            "number",
            "label shanghai",
            "blue cloud",
            "ltd regional",
            "apnic country",
            "cn continent",
            "algorithm",
            "data",
            "v3 serial",
            "cus cndigicert",
            "basic rsa",
            "cn ca",
            "g2 odigicert",
            "inc validity",
            "oshanghai blue",
            "road",
            "beijing country",
            "beijing",
            "please",
            "apnic person",
            "cn phone",
            "whois lookup",
            "bluecloud descr",
            "shanghai blue",
            "ltd descr",
            "cnnic",
            "whois lookups",
            "updated date",
            "apnic netname",
            "beijing abusec",
            "abuse cnniccn",
            "liu registrant",
            "country",
            "dns replication",
            "date",
            "domain",
            "first",
            "blacklist https",
            "heur",
            "html",
            "malware",
            "alexa top",
            "site",
            "filerepmetagen",
            "suspected",
            "adware",
            "cisco umbrella",
            "malware site",
            "win64",
            "opencandy",
            "cleaner",
            "artemis",
            "iframe",
            "agent",
            "unsafe",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "genkryptik",
            "exploit",
            "presenoker",
            "filetour",
            "conduit",
            "wacatac",
            "softcnapp",
            "xtrat",
            "cve201711882",
            "memscan",
            "phishing",
            "maltiverse",
            "zbot",
            "webtoolbar",
            "trojanspy",
            "million",
            "united",
            "phishing site",
            "malicious site",
            "proxy",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "safe site",
            "team",
            "fusioncore",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "alexa",
            "adposhel",
            "installpack",
            "xrat",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "download",
            "gamehack",
            "verdict",
            "falcon sandbox",
            "pattern match",
            "show",
            "file",
            "indicator",
            "ascii text",
            "appdata",
            "mitre att",
            "et tor",
            "known tor",
            "severity",
            "hybrid",
            "general",
            "misc attack",
            "beginstring",
            "script",
            "relayrouter",
            "exit",
            "node traffic",
            "null",
            "error",
            "unknown",
            "span",
            "body",
            "refresh",
            "class",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "click",
            "strings",
            "meta",
            "anonymizer",
            "team proxy",
            "host",
            "control server",
            "meterpreter",
            "dnspionage",
            "filerepmalware",
            "fakealert",
            "pony",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "patcher",
            "adload",
            "webcompanion",
            "seraph",
            "downloader",
            "generic",
            "dapato",
            "redline stealer",
            "beach research",
            "blacklist http",
            "generic malware",
            "fakedout threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "bundled",
            "dropped",
            "contacted",
            "most malicious",
            "server",
            "parent parent"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652a901fe2dbea9024b3d614",
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2420,
            "FileHash-SHA1": 189,
            "FileHash-SHA256": 3307,
            "URL": 1933,
            "domain": 255,
            "hostname": 1083,
            "CIDR": 1,
            "email": 4,
            "CVE": 27
          },
          "indicator_count": 9219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f14eabcb037c4257b827b",
          "name": "Packed.VMProt/ Packed.VMProtect Apple| iOS | Mac attack techapply.com",
          "description": "",
          "modified": "2023-11-04T16:00:22.229000",
          "created": "2023-10-30T02:28:58.264000",
          "tags": [
            "engineering",
            "united",
            "cyber threat",
            "team",
            "malware",
            "telefonica co",
            "heur",
            "malicious site",
            "ip reputation",
            "bambernek pony",
            "zeus",
            "nymaim",
            "facebook",
            "raccoon",
            "download",
            "kronos",
            "ramnit",
            "simda",
            "bank",
            "phishing",
            "citadel",
            "zbot",
            "pykspa",
            "agent",
            "maltiverse",
            "noname057",
            "copyright",
            "reserved",
            "flag",
            "date",
            "name server",
            "markmonitor",
            "server",
            "organization",
            "germany germany",
            "sample",
            "session details",
            "click",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "exit node",
            "traffic group",
            "suricata alerts",
            "event category",
            "analysis",
            "malicious url",
            "windows nt",
            "wow64",
            "response",
            "gmt contenttype",
            "gecko host",
            "vary",
            "gmt etag",
            "general gets",
            "script",
            "parking crew",
            "apple",
            "apple id",
            "tsara",
            "tsara brashears",
            "spyware",
            "cyber criminal",
            "cyber stalking",
            "track",
            "track iphone",
            "accept all platforms",
            "infringement",
            "intellectual property",
            "suricata",
            "alert",
            "red team",
            "happywifehappylife",
            "malicious",
            "revenge",
            "posts",
            "post",
            "post to web",
            "post to server",
            "exploit",
            "command_and_control",
            "toggle",
            "logon",
            "login",
            "privilege",
            "ios",
            "attack",
            "mitre",
            "Packed.VMProt",
            "apple engineering",
            "abuse",
            "cve",
            "robots",
            "arizona",
            "bounce",
            "canada",
            "croatia",
            "base64_encoded",
            "%samplepath%",
            "tagging",
            "png image",
            "PSI-USA, Inc. dba Domain Robot Organization",
            "dns",
            "query",
            "evasive",
            "crack",
            "record type",
            "ttl value",
            "dns replication",
            "santa fe",
            "available from",
            "registrar abuse",
            "iana id",
            "domain status",
            "creation date",
            "registrar url",
            "code",
            "dapato",
            "predator",
            "win64",
            "conduit",
            "fakeinstaller",
            "installpack",
            "generic",
            "downloader",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "cleaner",
            "networm",
            "mediaget",
            "softonic",
            "trojan",
            "encpk",
            "qbot",
            "swrort",
            "kraddare",
            "systweak",
            "iobit",
            "installcore",
            "artemis",
            "riskware",
            "dllinject",
            "driverpack",
            "trojanspy",
            "webtoolbar",
            "cisco umbrella",
            "ip hostname",
            "safe site",
            "site",
            "targeted",
            "AI",
            "dllinject"
          ],
          "references": [
            "Spyware",
            "Parking Crew Spyware",
            "c.parkingcrew.net 185.53.178.30 TTL: 9\tPSI-USA, Inc. dba Domain Robot Organization: Team Internet AG Name Server: NS-1403.AWSDNS-47.ORG",
            "http://service.appleid.apple.online.hqvce.techapply.com/apple/f625bbcc3a59f078ffa95159c719501e/index.php?itunes=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e",
            "service.appleid.apple.online.hqvce.techapply.com 76.223.35.103 TTL: 600\tTitanic Hosting, Inc. Name Server: NS1.DNE.COM",
            "d38psrni17bvxu.cloudfront.net 18.239.196.136 TTL: 60\tMarkMonitor, Inc. Organization: Amazon.com, Inc. Name Server: NS-1306.AWSDNS-35.ORG",
            "https://www.hybrid-analysis.com/sample/6450c8bb8cec78135dd4891507099d1407ef1d9af40bc250251eb99888c20f7e/651eda366e1436b384026c6d",
            "wTools",
            "Research and Analysis",
            "go.microsoft.com 184.26.158.64 TTL: 2672\tMarkMonitor, Inc. Organization: Microsoft Corporation Name Server: NS1.MSFT.NET",
            "dllinject"
          ],
          "public": 1,
          "adversary": "Cyber Criminal",
          "targeted_countries": [
            "Argentina",
            "Ireland",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "TinyZBot - S0004",
              "display_name": "TinyZBot - S0004",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Bambernek Pony",
              "display_name": "Bambernek Pony",
              "target": null
            },
            {
              "id": "Ransom:Win32/Nymaim",
              "display_name": "Ransom:Win32/Nymaim",
              "target": "/malware/Ransom:Win32/Nymaim"
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "TrojanSpy:Win32/Kronos",
              "display_name": "TrojanSpy:Win32/Kronos",
              "target": "/malware/TrojanSpy:Win32/Kronos"
            },
            {
              "id": "Trojan:Win32/Raccoonstealer",
              "display_name": "Trojan:Win32/Raccoonstealer",
              "target": "/malware/Trojan:Win32/Raccoonstealer"
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "Spammer:Win32/Noname",
              "display_name": "Spammer:Win32/Noname",
              "target": "/malware/Spammer:Win32/Noname"
            },
            {
              "id": "Worm:Win32/Pykspa",
              "display_name": "Worm:Win32/Pykspa",
              "target": "/malware/Worm:Win32/Pykspa"
            },
            {
              "id": "Banker",
              "display_name": "Banker",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Razy",
              "display_name": "Trojan:MSIL/Razy",
              "target": "/malware/Trojan:MSIL/Razy"
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:PUA:Win32/IObit",
              "display_name": "ALF:PUA:Win32/IObit",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Kraddare",
              "display_name": "TrojanDownloader:Win32/Kraddare",
              "target": "/malware/TrojanDownloader:Win32/Kraddare"
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot",
              "display_name": "Trojan:Win32/Qbot",
              "target": "/malware/Trojan:Win32/Qbot"
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "ALF:JASYP:PUAWin32/Systweak",
              "display_name": "ALF:JASYP:PUAWin32/Systweak",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dapato",
              "display_name": "Trojan:Win32/Dapato",
              "target": "/malware/Trojan:Win32/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1070.003",
              "name": "Clear Command History",
              "display_name": "T1070.003 - Clear Command History"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "651f177187ed5eba41657bf4",
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 485,
            "hostname": 551,
            "URL": 1019,
            "FileHash-SHA256": 650,
            "CVE": 5,
            "FileHash-MD5": 425,
            "FileHash-SHA1": 224,
            "FilePath": 2,
            "email": 2
          },
          "indicator_count": 3363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "897 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "651f177187ed5eba41657bf4",
          "name": "Packed.VMProt/ Packed.VMProtect Apple|  iOS | Mac attack techapply.com",
          "description": "Significantly infected Apple ID. and various devices; spyrixkeylogger, spyware, networm, tracking, beacons, injection, full control iOS and apple devices as well as OS. Appears as investigated. Not a lawful investigated. 5+ year (analysis reveals dated CVE's and malware specially targets individual) of spying, tagging, targeting, cyber criminal, cyber harassment, unlocker, disabled apple IDs. Interface / dummy core, collection, webdisk harvesting, cyber criminal behavior. Possible red teaming. js user, code written for a variety programs/systems, C2, relay router. robots. \ncyber threat.\nhired\ntargeted \nbotnets\nmalware\nAI",
          "modified": "2023-11-04T16:00:22.229000",
          "created": "2023-10-05T20:07:13.805000",
          "tags": [
            "engineering",
            "united",
            "cyber threat",
            "team",
            "malware",
            "telefonica co",
            "heur",
            "malicious site",
            "ip reputation",
            "bambernek pony",
            "zeus",
            "nymaim",
            "facebook",
            "raccoon",
            "download",
            "kronos",
            "ramnit",
            "simda",
            "bank",
            "phishing",
            "citadel",
            "zbot",
            "pykspa",
            "agent",
            "maltiverse",
            "noname057",
            "copyright",
            "reserved",
            "flag",
            "date",
            "name server",
            "markmonitor",
            "server",
            "organization",
            "germany germany",
            "sample",
            "session details",
            "click",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "exit node",
            "traffic group",
            "suricata alerts",
            "event category",
            "analysis",
            "malicious url",
            "windows nt",
            "wow64",
            "response",
            "gmt contenttype",
            "gecko host",
            "vary",
            "gmt etag",
            "general gets",
            "script",
            "parking crew",
            "apple",
            "apple id",
            "tsara",
            "tsara brashears",
            "spyware",
            "cyber criminal",
            "cyber stalking",
            "track",
            "track iphone",
            "accept all platforms",
            "infringement",
            "intellectual property",
            "suricata",
            "alert",
            "red team",
            "happywifehappylife",
            "malicious",
            "revenge",
            "posts",
            "post",
            "post to web",
            "post to server",
            "exploit",
            "command_and_control",
            "toggle",
            "logon",
            "login",
            "privilege",
            "ios",
            "attack",
            "mitre",
            "Packed.VMProt",
            "apple engineering",
            "abuse",
            "cve",
            "robots",
            "arizona",
            "bounce",
            "canada",
            "croatia",
            "base64_encoded",
            "%samplepath%",
            "tagging",
            "png image",
            "PSI-USA, Inc. dba Domain Robot Organization",
            "dns",
            "query",
            "evasive",
            "crack",
            "record type",
            "ttl value",
            "dns replication",
            "santa fe",
            "available from",
            "registrar abuse",
            "iana id",
            "domain status",
            "creation date",
            "registrar url",
            "code",
            "dapato",
            "predator",
            "win64",
            "conduit",
            "fakeinstaller",
            "installpack",
            "generic",
            "downloader",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "cleaner",
            "networm",
            "mediaget",
            "softonic",
            "trojan",
            "encpk",
            "qbot",
            "swrort",
            "kraddare",
            "systweak",
            "iobit",
            "installcore",
            "artemis",
            "riskware",
            "dllinject",
            "driverpack",
            "trojanspy",
            "webtoolbar",
            "cisco umbrella",
            "ip hostname",
            "safe site",
            "site",
            "targeted",
            "AI",
            "dllinject"
          ],
          "references": [
            "Spyware",
            "Parking Crew Spyware",
            "c.parkingcrew.net 185.53.178.30 TTL: 9\tPSI-USA, Inc. dba Domain Robot Organization: Team Internet AG Name Server: NS-1403.AWSDNS-47.ORG",
            "http://service.appleid.apple.online.hqvce.techapply.com/apple/f625bbcc3a59f078ffa95159c719501e/index.php?itunes=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e",
            "service.appleid.apple.online.hqvce.techapply.com 76.223.35.103 TTL: 600\tTitanic Hosting, Inc. Name Server: NS1.DNE.COM",
            "d38psrni17bvxu.cloudfront.net 18.239.196.136 TTL: 60\tMarkMonitor, Inc. Organization: Amazon.com, Inc. Name Server: NS-1306.AWSDNS-35.ORG",
            "https://www.hybrid-analysis.com/sample/6450c8bb8cec78135dd4891507099d1407ef1d9af40bc250251eb99888c20f7e/651eda366e1436b384026c6d",
            "wTools",
            "Research and Analysis",
            "go.microsoft.com 184.26.158.64 TTL: 2672\tMarkMonitor, Inc. Organization: Microsoft Corporation Name Server: NS1.MSFT.NET",
            "dllinject"
          ],
          "public": 1,
          "adversary": "Cyber Criminal",
          "targeted_countries": [
            "Argentina",
            "Ireland",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "TinyZBot - S0004",
              "display_name": "TinyZBot - S0004",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Bambernek Pony",
              "display_name": "Bambernek Pony",
              "target": null
            },
            {
              "id": "Ransom:Win32/Nymaim",
              "display_name": "Ransom:Win32/Nymaim",
              "target": "/malware/Ransom:Win32/Nymaim"
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "TrojanSpy:Win32/Kronos",
              "display_name": "TrojanSpy:Win32/Kronos",
              "target": "/malware/TrojanSpy:Win32/Kronos"
            },
            {
              "id": "Trojan:Win32/Raccoonstealer",
              "display_name": "Trojan:Win32/Raccoonstealer",
              "target": "/malware/Trojan:Win32/Raccoonstealer"
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "Spammer:Win32/Noname",
              "display_name": "Spammer:Win32/Noname",
              "target": "/malware/Spammer:Win32/Noname"
            },
            {
              "id": "Worm:Win32/Pykspa",
              "display_name": "Worm:Win32/Pykspa",
              "target": "/malware/Worm:Win32/Pykspa"
            },
            {
              "id": "Banker",
              "display_name": "Banker",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Razy",
              "display_name": "Trojan:MSIL/Razy",
              "target": "/malware/Trojan:MSIL/Razy"
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:PUA:Win32/IObit",
              "display_name": "ALF:PUA:Win32/IObit",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Kraddare",
              "display_name": "TrojanDownloader:Win32/Kraddare",
              "target": "/malware/TrojanDownloader:Win32/Kraddare"
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot",
              "display_name": "Trojan:Win32/Qbot",
              "target": "/malware/Trojan:Win32/Qbot"
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "ALF:JASYP:PUAWin32/Systweak",
              "display_name": "ALF:JASYP:PUAWin32/Systweak",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dapato",
              "display_name": "Trojan:Win32/Dapato",
              "target": "/malware/Trojan:Win32/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1070.003",
              "name": "Clear Command History",
              "display_name": "T1070.003 - Clear Command History"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 485,
            "hostname": 551,
            "URL": 1019,
            "FileHash-SHA256": 650,
            "CVE": 5,
            "FileHash-MD5": 425,
            "FileHash-SHA1": 224,
            "FilePath": 2,
            "email": 2
          },
          "indicator_count": 3363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "897 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "651f175a87ed5eba41657bf3",
          "name": "Packed.VMProt/ Packed.VMProtect Apple|  iOS | Mac attack techapply.com",
          "description": "Significantly infected Apple ID. and various devices; spyrixkeylogger, spyware, networm, tracking, beacons, injection, full control iOS and apple devices as well as OS. Appears as investigated. Not a lawful investigated. 5+ year (analysis reveals dated CVE's and malware specially targets individual) of spying, tagging, targeting, cyber criminal, cyber harassment, unlocker, disabled apple IDs. Interface / dummy core, collection, webdisk harvesting, cyber criminal behavior. Possible red teaming. js user, code written for a variety programs/systems, C2, relay router. robots. \ncyber threat.\nhired\ntargeted \nbotnets\nmalware\nAI",
          "modified": "2023-11-04T16:00:22.229000",
          "created": "2023-10-05T20:06:50.075000",
          "tags": [
            "engineering",
            "united",
            "cyber threat",
            "team",
            "malware",
            "telefonica co",
            "heur",
            "malicious site",
            "ip reputation",
            "bambernek pony",
            "zeus",
            "nymaim",
            "facebook",
            "raccoon",
            "download",
            "kronos",
            "ramnit",
            "simda",
            "bank",
            "phishing",
            "citadel",
            "zbot",
            "pykspa",
            "agent",
            "maltiverse",
            "noname057",
            "copyright",
            "reserved",
            "flag",
            "date",
            "name server",
            "markmonitor",
            "server",
            "organization",
            "germany germany",
            "sample",
            "session details",
            "click",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "exit node",
            "traffic group",
            "suricata alerts",
            "event category",
            "analysis",
            "malicious url",
            "windows nt",
            "wow64",
            "response",
            "gmt contenttype",
            "gecko host",
            "vary",
            "gmt etag",
            "general gets",
            "script",
            "parking crew",
            "apple",
            "apple id",
            "tsara",
            "tsara brashears",
            "spyware",
            "cyber criminal",
            "cyber stalking",
            "track",
            "track iphone",
            "accept all platforms",
            "infringement",
            "intellectual property",
            "suricata",
            "alert",
            "red team",
            "happywifehappylife",
            "malicious",
            "revenge",
            "posts",
            "post",
            "post to web",
            "post to server",
            "exploit",
            "command_and_control",
            "toggle",
            "logon",
            "login",
            "privilege",
            "ios",
            "attack",
            "mitre",
            "Packed.VMProt",
            "apple engineering",
            "abuse",
            "cve",
            "robots",
            "arizona",
            "bounce",
            "canada",
            "croatia",
            "base64_encoded",
            "%samplepath%",
            "tagging",
            "png image",
            "PSI-USA, Inc. dba Domain Robot Organization",
            "dns",
            "query",
            "evasive",
            "crack",
            "record type",
            "ttl value",
            "dns replication",
            "santa fe",
            "available from",
            "registrar abuse",
            "iana id",
            "domain status",
            "creation date",
            "registrar url",
            "code",
            "dapato",
            "predator",
            "win64",
            "conduit",
            "fakeinstaller",
            "installpack",
            "generic",
            "downloader",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "cleaner",
            "networm",
            "mediaget",
            "softonic",
            "trojan",
            "encpk",
            "qbot",
            "swrort",
            "kraddare",
            "systweak",
            "iobit",
            "installcore",
            "artemis",
            "riskware",
            "dllinject",
            "driverpack",
            "trojanspy",
            "webtoolbar",
            "cisco umbrella",
            "ip hostname",
            "safe site",
            "site",
            "targeted",
            "AI",
            "dllinject"
          ],
          "references": [
            "Spyware",
            "Parking Crew Spyware",
            "c.parkingcrew.net 185.53.178.30 TTL: 9\tPSI-USA, Inc. dba Domain Robot Organization: Team Internet AG Name Server: NS-1403.AWSDNS-47.ORG",
            "http://service.appleid.apple.online.hqvce.techapply.com/apple/f625bbcc3a59f078ffa95159c719501e/index.php?itunes=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e",
            "service.appleid.apple.online.hqvce.techapply.com 76.223.35.103 TTL: 600\tTitanic Hosting, Inc. Name Server: NS1.DNE.COM",
            "d38psrni17bvxu.cloudfront.net 18.239.196.136 TTL: 60\tMarkMonitor, Inc. Organization: Amazon.com, Inc. Name Server: NS-1306.AWSDNS-35.ORG",
            "https://www.hybrid-analysis.com/sample/6450c8bb8cec78135dd4891507099d1407ef1d9af40bc250251eb99888c20f7e/651eda366e1436b384026c6d",
            "wTools",
            "Research and Analysis",
            "go.microsoft.com 184.26.158.64 TTL: 2672\tMarkMonitor, Inc. Organization: Microsoft Corporation Name Server: NS1.MSFT.NET",
            "dllinject"
          ],
          "public": 1,
          "adversary": "Cyber Criminal",
          "targeted_countries": [
            "Argentina",
            "Ireland",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "TinyZBot - S0004",
              "display_name": "TinyZBot - S0004",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Bambernek Pony",
              "display_name": "Bambernek Pony",
              "target": null
            },
            {
              "id": "Ransom:Win32/Nymaim",
              "display_name": "Ransom:Win32/Nymaim",
              "target": "/malware/Ransom:Win32/Nymaim"
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "TrojanSpy:Win32/Kronos",
              "display_name": "TrojanSpy:Win32/Kronos",
              "target": "/malware/TrojanSpy:Win32/Kronos"
            },
            {
              "id": "Trojan:Win32/Raccoonstealer",
              "display_name": "Trojan:Win32/Raccoonstealer",
              "target": "/malware/Trojan:Win32/Raccoonstealer"
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "Spammer:Win32/Noname",
              "display_name": "Spammer:Win32/Noname",
              "target": "/malware/Spammer:Win32/Noname"
            },
            {
              "id": "Worm:Win32/Pykspa",
              "display_name": "Worm:Win32/Pykspa",
              "target": "/malware/Worm:Win32/Pykspa"
            },
            {
              "id": "Banker",
              "display_name": "Banker",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Razy",
              "display_name": "Trojan:MSIL/Razy",
              "target": "/malware/Trojan:MSIL/Razy"
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:PUA:Win32/IObit",
              "display_name": "ALF:PUA:Win32/IObit",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Kraddare",
              "display_name": "TrojanDownloader:Win32/Kraddare",
              "target": "/malware/TrojanDownloader:Win32/Kraddare"
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot",
              "display_name": "Trojan:Win32/Qbot",
              "target": "/malware/Trojan:Win32/Qbot"
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "ALF:JASYP:PUAWin32/Systweak",
              "display_name": "ALF:JASYP:PUAWin32/Systweak",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dapato",
              "display_name": "Trojan:Win32/Dapato",
              "target": "/malware/Trojan:Win32/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1070.003",
              "name": "Clear Command History",
              "display_name": "T1070.003 - Clear Command History"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 485,
            "hostname": 551,
            "URL": 1019,
            "FileHash-SHA256": 650,
            "CVE": 5,
            "FileHash-MD5": 425,
            "FileHash-SHA1": 224,
            "FilePath": 2,
            "email": 2
          },
          "indicator_count": 3363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "897 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63b8d4c409e700197eb7326a",
          "name": "escaneo spam, bots y anonimizacion din\u00e1mica diciembre",
          "description": "escaneo spam, bots y anonimizacion din\u00e1mica",
          "modified": "2023-02-06T01:05:46.115000",
          "created": "2023-01-07T02:11:16.771000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "SebastianVelasquez",
            "id": "209827",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2004,
            "hostname": 915,
            "domain": 553,
            "CVE": 2,
            "FileHash-SHA256": 615
          },
          "indicator_count": 4089,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 11,
          "modified_text": "1168 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/MAL_Agent_May20_1 DESCRIPTION:",
        "IP 114.114.114.114 Antivirus Detections: Backdoor:Linux/Dofloo.A!MTB ,  Backdoor:Linux/Gafgyt.AF!MTB ,  Can't access file ,",
        "dllinject",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
        "RULE: MAL_Agent_May20_1 RULE_SET: Livehunt - Default22 Indicators RULE_TYPE: VALHALLA rule feed only \u26a1- RULE_AUTHOR: Florian Roth",
        "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e/652c962002e18b99e20e891a",
        "https://gpt.ocloo.cn/auth",
        "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
        "Antivirus Detections Win32:Filecoder-AD\\ [Trj] ,  Win.Malware.Cabby-6803812-0 ,  TrojanDownloader:Win32/Dalexis!rfn!rfn",
        "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "https://blog.malwarebytes.org/intelligence/2016/03/maktub-locker-beautiful-and-dangerous/",
        "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
        "67.227.226.240             command_and_control. [lb01.parklogic.com] Lansing Michigan",
        "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
        "https://lelosexgame.com/datingsm?ad_campaign_id=3161239&cost=0&creative_id=2032565&external_id=0&keyword=%25KW%25&ref=https://example.com&ref_domain=example.com&server_node=0&source=0",
        "www.sweetheartvideo.com      Tracking and Botnet campaign",
        "service.appleid.apple.online.hqvce.techapply.com 76.223.35.103 TTL: 600\tTitanic Hosting, Inc. Name Server: NS1.DNE.COM",
        "cat-are-here.ru",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io        BitcoinAussie",
        "https://twitter.com/PORNO_SEXYBABES - Nokoyawa  catapult spider",
        "CloudFlare Domain: apple-dns.net",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635   exploit  [You can pair older Samsung watches with an iPhone by downloading the Samsung Galaxy Watch (Gear S) app from the iOS App. Abused remotely?]",
        "http://call-em-all.com/AddNumbersToBroadcast",
        "http://call-em-all.com/GetSMSOptIns",
        "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 129, 750, 824, 439, 282, 820, 21 , 63, 896, 91, 11, 202, 684 919,31 ,156, 743",
        "Domain   nr-data.net                                                   (Apple Private Data Collection)",
        "monitoring.akhavan.pro",
        "https://sslbl.abuse.ch/blacklist/sslipblacklist_aggressive.rules",
        "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 869, 42, 6, 443, 85, 416, 688, 117, 217, 217, 443, 709, 703, 879, 338, 682",
        "199.249.230.74            traffic group 78",
        "Spyware",
        "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
        "https://www.pornhub.com    prism.exe  [Massachusetts, US]",
        "https://ftp.zedz.net/vir/Trojan-PSW.HTML.YahooLogon/",
        "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception",
        "YARA Signature Match - THOR APT Scanner - RULE_AUTHOR: Florian Roth",
        "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=  \t\t   (nr-data.net email collection contractual agreement)",
        "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "URL https://assets.msn.com/bundles/v1/homePage/latest/midlevel/vendors.ef7dde432bed42c1b7db.js.            (t .map \"pattern match\")",
        "64.190.63.136        Malicious. IP: Sedo GmbH",
        "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
        "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017 [Colorado, US references]",
        "IDS: Matches rule (http_inspect) white space before or between HTTP messages Matches rule SURICATA HTTP Request abnormal Content-Encoding",
        "Hostname www.assurant.com                     (nr- data email collection from apple devices)",
        "Hostname www.bing.com                                         (pattern match)",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    phishing",
        "Interesting Strings: http://www.w3.org/1999/02/22",
        "20.99.186.246               exploit_source",
        "Emails: pegasusplus@gmail.com Name: Zhao Zhenping Name Servers: NS1000.114DNS.COM Org: Nanjing XinFeng Network Technologies, Inc.",
        "Alerts: queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name",
        "hostnameobject.prototype.hasownproperty.call.     (API commands to newly acquired property of target and family)",
        "http://call-em-all.com/GetSchedules",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512   [Colorado, US referenced malvertizing outfit]",
        "CVE-2022-26134",
        "Detects malware used in activity noticed  05/2020 likely related to Chinese actor",
        "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
        "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
        "http://call-em-all.com/InsertCustomCall",
        "Entity CLOUD14",
        "http://call-em-all.com/CheckPhoneNumber",
        "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
        "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
        "110.249.196.101.          malware_hosting",
        "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
        "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb",
        "http://karnalketo.com/sound-found                             error code 432      server nginx",
        "www.sweetheartvideo.com",
        "Sigma: Matches rule Failed Code Integrity Checks by Thomas Patzke Matches rule Process Creation Using Sysnative Folder by Max Altgelt",
        "External Hosts Top Country United States, Germany | IP Hostname: 104.16.149.244: fbi.gov | United States: AS13335 cloudflare",
        "https://hybrid-analysis.com/sample/ee534a0e8a8bc013fadef020f518d44925b2adf0126444aee53b7a51aadfcb7a/654f6940ec2068706b0ae5ca",
        "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "https://www.hybrid-analysis.com/sample/6450c8bb8cec78135dd4891507099d1407ef1d9af40bc250251eb99888c20f7e/651eda366e1436b384026c6d",
        "https://www.virustotal.com/gui/collection/789999053bd7022e2d79a887a5f959be573ce57d6c4f3165503438fbd5dd9ad5/graph",
        "Ransomware\u00bbTrojanDownloader:Win32/Dalexis | FileHash-SHA256  01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
        "Detections Potential SSH Scan OUTBOUND",
        "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
        "IP\u2019s Contacted:  104.16.149.244  128.31.0.39  131.188.40.189  14.200.177.98  148.251.79.57",
        "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
        "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Request\t2008113",
        "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
        "go.microsoft.com 184.26.158.64 TTL: 2672\tMarkMonitor, Inc. Organization: Microsoft Corporation Name Server: NS1.MSFT.NET",
        "http://call-em-all.com/DeleteNumberFromBroadcast.       (Brutes)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017    Another target?",
        "Parking Crew Spyware",
        "vmwarevmc.com",
        "http://call-em-all.com/GetAccountKeywords",
        "Hostname vortex-nlb-http2-fed-us-taut-purple.nr-data.net",
        "http://call-em-all.com/AddPersonsToList",
        "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [HappyRabbit]",
        "www.anyxxxtube.net               prism.exe",
        "img-prod-cms-rt-microsoft-com.akamaized.net  (img-prod-cm Nagano east amazonaws)",
        "Alerts: dead_host network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http packer_entropy",
        "URL   http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "Tor Get Server Request",
        "http://service.appleid.apple.online.hqvce.techapply.com/apple/f625bbcc3a59f078ffa95159c719501e/index.php?itunes=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e",
        "IP 114.114.114.114 Antivirus Detections: ALF:PUA:Block:VrBrothers.R!MTB ,  ALF:Trojan:MSIL/AgentTesla.KM ,  ALFPER:RefLoadApiHash ,",
        "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
        "REFERENCE: ACSC IOCs May 2020 pivoting RULE_AUTHOR: Florian Roth",
        "wallpapers-nature.com",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net \tketogenic switch , BitcoinAussie",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
        "Type Indicator Reason:  IPv4 192.168.56.108 Private IP Address:  IPv4 46.20.35.112 IP Associated with Tor Exit Nodes:  Domain: fbi.gov",
        "t.call    (targets communication storage)",
        "IDS: Matches rule ET JA3 Hash - Possible Malware - Dridex",
        "Type Indicator Reason:  IPv4 104.16.149.244 In CDN range: provider=cloudflare  IPv4 131.188.40.189 IP Associated with Tor Exit Nodes",
        "tv.apple.com                               Apple hacking",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters raises_exception",
        "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
        "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
        "https://view.emails.sonymusicfans.com/Error.aspx",
        "https://otx.alienvault.com/indicator/url/https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 ?  A target on my devices?",
        "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
        "Domains Contacted: fbi.gov",
        "Address:\tRoom 301, Building 3B, Startup park, High Tech park, Shiyang Road 56, Baixia District, Nanjing, Jiangsu, China City nan jing shi Country",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian     password cracker",
        "nr-data.net                                 Private Apple data collection",
        "URL http://movies.waploaded.ng/search/Horse-Sex-Women.html                     (",
        "a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 [apple to windows China ??]",
        "1.62.64.108                  malware_hosting",
        "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
        "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
        "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
        "https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "114.114.1114.114",
        "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
        "Yara Detections: LZMA",
        "wTools",
        "https://app.call-em-all.com/broadcasts/all/login?redirect=/broadcasts/all",
        "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
        "https://twitter.com/               catapult spider/spider",
        "http://url3308.macorva.com/asm/UNSUBSCRIBE/?user_id=10055259&data=bQ0N-GNp87vailMH8NcX8hVikM6oRFcaYffHPXNvHhxoMDAwdTAwMIZgp6VEcimR2OR6-FgE5LbQmvMKgBcNzfKlzFUlyGhihCTfgGNhqBwYspOmdyExodXueDIXSrpmprp7qqmciBoXxvis5p6MnzhFBM5DSEXvhwy8DunkXxGDBX-Jps3Ihyo3TwAwGKJrlBnUc9b0m9OrG0Gnn8WUnB94unMY8ZMOgaCblwprg85sSdpRgipzAMyP_KxiQKceH-blAFTSIxL5MCSDStpmbiQZ4hVBNMKVaD7KsxSMie09qyTXMdiTsBZv57uwBpGLwpsKyNyJRNDag3flmayRklZ3XkMkhxm8epKkbxiASkjL8XqOpRh1MYS92ivMoL0YvpNeaKc_svs=",
        "https://otx.alienvault.com/indicator/url/http://cinefest.com/en/submissions/",
        "Research and Analysis",
        "Cryptographical plain text c\ufffdh\u000f\u00107\ufffd\ufffd1Q\ufffd\u0286\ufffd\u0254E\ufffdW\u0014\ufffd\u0382\ufffd Rw\ufffde\ufffd\ufffd%\u000b\ufffd\ufffd\ufffdreudt\ufffd\ufffd\ufffd",
        "IP\u2019s Contacted: 185.220.100.255  199.249.230.142  199.254.238.52 23.128.248.20  45.58.156.76",
        "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
        "0.0.0.0                                            iplocal=comcast [iplocalpple.com, possibly misconfigured]         exploit",
        "IP 114.114.114.114 Antivirus Detections: !#SIGATTR:IEProxyChange ,  ALF:Backdoor:Win64/Meterpreter.AB!MTB ,",
        "d38psrni17bvxu.cloudfront.net 18.239.196.136 TTL: 60\tMarkMonitor, Inc. Organization: Amazon.com, Inc. Name Server: NS-1306.AWSDNS-35.ORG",
        "IDS Detections: Maktub Locker TOR Status Check TOR Consensus Data Requested TOR 1.0 Server Key Retrieval Tor Get Server Request TLS Handshake",
        "https://www.sweetheartvideo.com/tsara-brashears/Tracker and Botnet campaign",
        "e.call    (API call invasion)",
        "http://ww1.karnalketo.com/astroshift-soundtrack-cheat-code-incl-product-key-download-3264bit-latest/                  error code 432    server nginx",
        "itunes.apple.com.                     [https:///app/apple-store",
        "IP 114.114.114.114 Antivirus Detections: Trojan:Win32/Magania.DSK!MTB , TEL:SIGATTR:CreateRemoteThread",
        "PE Anomalies: entropy_based | Yara Detections: Yara Detections stack_string | Stack_String: stack_string E\u000fEEEE\u000fEEEE\u000fEEEE\u000fEEEE\u000fEE\u000fEE\u000fEE\u000fEE\u000f",
        "IP 114.114.114.114 Domain 114dns.com: PegasusPlus",
        "https://otx.alienvault.com/indicator/url/http://blacklist1.dnsblocklist.com",
        "http://call-em-all.com/UpdateAccountInfo",
        "time-a.nist.gov                     (DNS ipify Control)",
        "IDS:  Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
        "DISA Entrypoint: call 0x41259b jmp 0x40b3ac int3 int3 int3 int3 int3 int3 int3 int3",
        "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
        "Interesting Strings: http://ns.adobe.com/xap/1.0/mm/ http://ns.adobe.com/xap/1.0/  http://ns.adobe.com/xap/1.0/sType/ResourceRef",
        "Yara Detections: stack_string Alerts: dead_host",
        "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
        "Hostname www.pornhub.com                                (password cracker)",
        "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
        "FileHash-MD5 879623feffedf5672dffc85c269af125",
        "a-poster.info                 [tagging tool]",
        "c.parkingcrew.net 185.53.178.30 TTL: 9\tPSI-USA, Inc. dba Domain Robot Organization: Team Internet AG Name Server: NS-1403.AWSDNS-47.ORG",
        "114.114.114.114 IDS Detections DYNAMIC_DNS Query to a *.ns1.name Domain Query to a *.top domain - Likely Hostile Observed DNS Query to .work",
        "newrelic.se                                  New Update Apple iPhone 199.59.243.222",
        "ec2-35-161-55-221.us-west-2.compute.amazonaws.com.     (Boardman, Oregon)",
        "https://tulach.cc/    phishing | Proxy | Skynet",
        "Virus: \"ba30376f915afa868763f84299fae5d2.virus.rtf - LibreOffice Writer\"",
        "tulach.cc| 114.114.114.114 [public1.114dns.com] | thebrotherssabey | bian sabey under multiple WP & DGA domains , various titles , various roles",
        "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Cyber Criminal",
            "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Reques",
            "[Unnamed US Teams and Hacker group]"
          ],
          "malware_families": [
            "Backdoor:win32/konus.a",
            "Looquer",
            "Alf:jasyp:puawin32/systweak",
            "Ketogenic switch",
            "Qakbot - s0650",
            "Bitcoinaussie",
            "Remcos",
            "Tulach",
            "Gamehack",
            "Ramnit",
            "Spammer:win32/noname",
            "Mirai (elf)",
            "Daxin",
            "Nokoyawa",
            "Code virus ransomware",
            "Azorult - s0344",
            "Worm:win32/pykspa",
            "Virus:dos/nanjing",
            "Trojandownloader:win32/kraddare",
            "Alf:heraklezeval:pua:win32/spyrixkeylogger",
            "Trojan:win32/dapato",
            "Unix.trojan.mirai-10028259-0",
            "Trojandownloader:win32/dalexis!rfn!rfn",
            "Ms defender - trojandownloader:win32/dalexis!rfn!rfn",
            "Win32:dangeroussig\\ [trj]",
            "Bambernek pony",
            "Unix.trojan.gafgyt-6981160-0",
            "Alf:pua:win32/iobit",
            "Ursnif - s0386",
            "Trojan:win32/installcore",
            "Colibri loader",
            "Win32:trojan-gen",
            "Korplug",
            "Maltiverse",
            "Trojan.generic",
            "Trojanspy",
            "Mirai (windows)",
            "Ransomexx",
            "Mirai",
            "Colbalt strike",
            "Quasar rat",
            "Ransomware",
            "Virus:wm/look",
            "Beach research",
            "Backdoor:win32/simda",
            "Trojan:win32/raccoonstealer",
            "Avast- win32:filecoder-ad\\ [trj]",
            "Trojan:msil/razy",
            "Generic",
            "Banker",
            "Elf:mirai-sj\\ trj",
            "Behav",
            "Njrat - s0385",
            "Skynet",
            "Trojan:win32/magania",
            "Trojan:win32/qbot",
            "Webtoolbar",
            "Maktub locker",
            "Formbook",
            "Ransom:win32/nymaim",
            "Win64:trojanx-gen\\ [trj]",
            "Win.malware.ulise-9886066-0",
            "Trojan:win32/wacatac",
            "Emotet",
            "Alf:pua:win32/fusioncore",
            "Packed.vmprotect",
            "Trojan x",
            "Tinyzbot - s0004",
            "Fali",
            "Trojanspy:win32/kronos",
            "Clamav - win.malware.cabby-6803812",
            "Zbot",
            "Chaos"
          ],
          "industries": [
            "Technology",
            "Government",
            "Telecommunications"
          ],
          "unique_indicators": 271520
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/mmms.eu",
    "whois": "http://whois.domaintools.com/mmms.eu",
    "domain": "mmms.eu",
    "hostname": "block2.mmms.eu"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 36,
  "pulses": [
    {
      "id": "69a1a73eb0578b92962dae97",
      "name": "FBI Link (Ransomware)sent to a device. opened on its own. Why?",
      "description": "I wouldn\u2019t typically search an alleged authentic government site , except it opened on a device, no prompt. TrojanDownloader:Win32/Dalexis!rfn!rfn\nIDS Detections\nMaktub Locker TOR Status Check\nTOR Consensus Data Requested\nTOR 1.0 Server Key Retrieval\nTor Get Server Request\nTLS Handshake Failure\nYara Detections\nstack_string\nWho is : [URL\n[https://tor-dirauth.sebastianhahn.net/]\n[https://tor.sebastianhahn.net]\n[tor-dirauth.sebastianhahn.net]\n->gitbot.faui2k9.de\n[Status faui2k9.de -connect] connects to device \n100% Malicious | https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70 |  [External resources discovered in HTML content:\ndap.digitalgov.gov | Pattern match: \"fbi.gov/contact-us/field-offices/denver/news/pr\"\nHeuristic match: \"x.com\" | will revisit",
      "modified": "2026-03-29T13:04:34.750000",
      "created": "2026-02-27T14:16:30.498000",
      "tags": [
        "regopenkeyexw",
        "port",
        "destination",
        "cryptexportkey",
        "search",
        "show",
        "entries",
        "windows nt",
        "regsetvalueexa",
        "ip address",
        "malware",
        "copy",
        "write",
        "win32",
        "next",
        "format",
        "contacted",
        "less ip",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "date",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "february",
        "failed",
        "enter",
        "data upload",
        "passive dns",
        "urls",
        "aaaa",
        "certificate",
        "otx logo",
        "all hostname",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "title",
        "body",
        "encrypt",
        "netherlands",
        "gmt content",
        "all ipv4",
        "amsterdam",
        "hetzner online",
        "gmbh",
        "summary",
        "url age",
        "de seen",
        "general info",
        "geo germany",
        "as as24940",
        "de note",
        "route",
        "direct",
        "pro platform",
        "logs",
        "suricata alert",
        "et info",
        "tls handshake",
        "bad traffic",
        "suricata alerts",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "size",
        "sha256",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "path",
        "unknown",
        "stop",
        "root",
        "hybrid",
        "general",
        "local",
        "form",
        "click",
        "strings",
        "9999",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "show technique",
        "ck matrix",
        "href",
        "antivirus",
        "maktub locker",
        "tor status",
        "check"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1129,
        "domain": 148,
        "hostname": 753,
        "FileHash-SHA256": 548,
        "FileHash-MD5": 90,
        "FileHash-SHA1": 71,
        "SSLCertFingerprint": 8,
        "CIDR": 1,
        "email": 4
      },
      "indicator_count": 2752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65359c9a15459988a9b779d9",
      "name": "Switzerland",
      "description": "",
      "modified": "2026-03-10T21:45:03.925000",
      "created": "2023-10-22T22:05:14.192000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3889,
        "hostname": 5284,
        "FileHash-SHA256": 1343,
        "domain": 1430,
        "CVE": 3
      },
      "indicator_count": 11949,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 179,
      "modified_text": "40 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "695fd5fa266f9ea34c8f5c45",
      "name": "Cats and Kittens Attack Mirai Botnet and how it may target Threat Exchange users",
      "description": "Cat attacks related to LummaC2 attacks,info stealing, domain seizures, etc. Including are references to the Lumma C2 with cats and Aura Stealer attacks. Same attack group , includes Mirai Botnet. Has the group become a larger , stronger adversary? \nSony Music connection. I\u2019m aware (The US Department of Justice and Microsoft disrupted LummaC2 infostealing-malware through domain seizures, taking down over 2,300 associated domains. The FBI and CISA by AlienVault) Further research necessary.",
      "modified": "2026-02-07T14:04:48.556000",
      "created": "2026-01-08T16:06:18.126000",
      "tags": [
        "levelblue labs",
        "mirai",
        "windows",
        "ck ids",
        "application",
        "network denial",
        "service",
        "contacted",
        "search",
        "unknown",
        "top source",
        "top destination",
        "source source",
        "china as4812",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "enter",
        "udp include",
        "country",
        "unique",
        "unique asns",
        "ip hostname",
        "reverse ip",
        "lookup country",
        "china as17429",
        "taiwan as3462",
        "new caledonia",
        "as18200 office",
        "china as4538",
        "china as9394",
        "india as137654",
        "japan as2514",
        "japan as9365",
        "china as45083",
        "endian",
        "linux",
        "apple",
        "linux subsys",
        "lang c",
        "linenum",
        "lsyms",
        "machine",
        "static",
        "va",
        "os linux",
        "nx",
        "relocs",
        "intel 8038",
        "elf32",
        "malware distribution",
        "domain seizures",
        "infostealing malware",
        "cat-themed domains",
        "gather victim",
        "t1589",
        "t1568",
        "t1590",
        "web protocols",
        "drop resolver",
        "t1568 t1590",
        "show",
        "filehash",
        "md5 add",
        "pulse pulses",
        "copy",
        "affected _and_fixed",
        "thank you"
      ],
      "references": [
        "cat-are-here.ru",
        "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
        "Yara Detections: LZMA",
        "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
        "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
        "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
        "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
        "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
        "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
        "CloudFlare Domain: apple-dns.net",
        "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
        "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
        "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
        "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
        "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
        "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
        "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
        "https://view.emails.sonymusicfans.com/Error.aspx",
        "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
        "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click",
        "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
        "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
        "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
        "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
        "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
        "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
        "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Mirai (Windows)",
          "display_name": "Mirai (Windows)",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-10028259-0",
          "display_name": "Unix.Trojan.Mirai-10028259-0",
          "target": null
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981160-0",
          "display_name": "Unix.Trojan.Gafgyt-6981160-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1584.001",
          "name": "Domains",
          "display_name": "T1584.001 - Domains"
        },
        {
          "id": "T1102.001",
          "name": "Dead Drop Resolver",
          "display_name": "T1102.001 - Dead Drop Resolver"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 74,
        "FileHash-SHA1": 74,
        "FileHash-SHA256": 1067,
        "URL": 2140,
        "domain": 247,
        "hostname": 674,
        "CVE": 2
      },
      "indicator_count": 4278,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "71 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68dd9423f9208dcc8701e12e",
      "name": "Maktub Locker TOR Status Check \u2022 Cab \\ Drive by( dbi.com) Malicious pic",
      "description": "After 911 told me I was bounced to the Denver, Co Station 5 , located 45 & Peoria in Denver , Colorado , not even close. \nThe phone number changed, only 911 access. Clue: I saw an Amber alert in n target phone when I powered it on. No all notices always turned off. Made a call\non contact list and screen changed to a plain faced interface. \n\nAfter finding a mother foundry link on targets phone I grew curious about a CEO\u2019s strange story of Palantir\u2019s Karp Theil roommate situation in Law School but I could only find one picture on of them on a campus in their late 40\u2019s. He\u2019s African American mixed. The picture of his mother in hacked phone is 215 yo. No information federal oversight as CEO right? Or limited information on crazy hacked device? \n\nClicked on link then OMGness\n\n#whatIfind #onhackeddevice #targeting",
      "modified": "2025-10-31T19:03:21.338000",
      "created": "2025-10-01T20:50:43.002000",
      "tags": [
        "iocs",
        "logo",
        "passive dns",
        "related tags",
        "none google",
        "ipv4",
        "gogle",
        "twitter",
        "x.com",
        "ransomware",
        "fbi \u2019site\u2019",
        "python",
        "cloud",
        "regopenkeyexw",
        "read c",
        "port",
        "destination",
        "cryptexportkey",
        "count read",
        "tor get",
        "malware",
        "write",
        "format",
        "redacted for",
        "server",
        "privacy tech",
        "privacy admin",
        "country",
        "postal code",
        "organization",
        "date",
        "email",
        "code",
        "aaaa",
        "value a",
        "key identifier",
        "v3 serial",
        "number",
        "cus ogoogle",
        "trust",
        "cnwe1 validity",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "maktub",
        "cnc",
        "python-projekt",
        "x post",
        "link",
        "android",
        "iphone",
        "google",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "ssl certificate",
        "spawns",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "mitre att",
        "show technique",
        "ck matrix",
        "title",
        "path",
        "hybrid",
        "general",
        "local",
        "form",
        "click",
        "strings",
        "body"
      ],
      "references": [
        "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
        "Entity CLOUD14",
        "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
        "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
        "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
        "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
        "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
        "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
        "Yara Detections: stack_string Alerts: dead_host",
        "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
        "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Code Virus Ransomware",
          "display_name": "Code Virus Ransomware",
          "target": null
        },
        {
          "id": "AVAST- Win32:Filecoder-AD\\ [Trj]",
          "display_name": "AVAST- Win32:Filecoder-AD\\ [Trj]",
          "target": null
        },
        {
          "id": "CLAMAV - Win.Malware.Cabby-6803812",
          "display_name": "CLAMAV - Win.Malware.Cabby-6803812",
          "target": null
        },
        {
          "id": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "display_name": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "target": "/malware/Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 574,
        "domain": 147,
        "FileHash-MD5": 156,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 539,
        "URL": 982,
        "SSLCertFingerprint": 4,
        "email": 2
      },
      "indicator_count": 2534,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "170 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6615d6998eba463f36adf923",
      "name": "hxxps://viz[.]greynoise[.]io/analysis/22fe6389-fe4a-49dc-b343-b6a2feb32864 - 04.04.24 by jwanihad (enriched)",
      "description": "",
      "modified": "2025-06-23T17:53:11.641000",
      "created": "2024-04-10T00:00:25.617000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/gui/collection/789999053bd7022e2d79a887a5f959be573ce57d6c4f3165503438fbd5dd9ad5/graph"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2361,
        "domain": 632,
        "FileHash-SHA256": 644,
        "hostname": 918
      },
      "indicator_count": 4555,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 182,
      "modified_text": "300 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6775b17c488523ee9d290afd",
      "name": "agressive extra",
      "description": "",
      "modified": "2025-03-17T22:57:49.933000",
      "created": "2025-01-01T21:19:56.847000",
      "tags": [],
      "references": [
        "https://sslbl.abuse.ch/blacklist/sslipblacklist_aggressive.rules"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 35208,
        "URL": 79504,
        "domain": 19527,
        "hostname": 28058,
        "CVE": 9
      },
      "indicator_count": 162306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 199,
      "modified_text": "398 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66dfa5a84844f3703fea6b84",
      "name": "Maktub Locker Ransomware",
      "description": "Maktub Locker Ransomware is old, works and arrives to victims like typical ransomware. I .  I'm can't make a valuable contribution regarding link that  populates fbi.gov node without security header. . Tulach -114.114.114.114 is at the center of most of the vulnerabilities I've researched. I've removed Tsara Brashears and name and organizations relating Brian Sabey from pulse. VT Alexo auto populated in tags. Internet search shows he referenced link and 'black suits' I did not research VT-Alexo and I don't know his significance to the Ransomware link [link appears 1st in references]. \nThere has been so much government, healthcare, legal, and law enforcement entanglement and/or/likely impersonation regarding a main issue I've been researching. Lost in this moment...",
      "modified": "2024-10-09T21:01:40.228000",
      "created": "2024-09-10T01:49:28.437000",
      "tags": [
        "axeljg",
        "kulinskiarkadi",
        "ip hostname",
        "reverse ip",
        "united",
        "regopenkeyexw",
        "cryptexportkey",
        "regsetvalueexa",
        "ip address",
        "medium",
        "regdword",
        "t1047",
        "instrumentation",
        "rpcs",
        "high",
        "win32",
        "malware",
        "showing",
        "entries disa",
        "entrypoint",
        "fbi.gov",
        "alexo",
        "germany",
        "united states",
        "brian sabey",
        "thebrotherssabey",
        "alexo virustotal",
        "yara detections",
        "ids detections",
        "contacted",
        "show",
        "medium windows",
        "alerts",
        "maktub locker",
        "tsara brashness dead",
        "aig",
        "soc",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "compiler",
        "vs2008",
        "vs2005",
        "contained",
        "info compiler",
        "products",
        "vs2008 sp1",
        "header intel",
        "name md5",
        "type",
        "language",
        "virus",
        "urls",
        "javascript",
        "b file",
        "files",
        "file type",
        "rich text",
        "format",
        "found",
        "downloads",
        "injection t1055",
        "spawns",
        "t1497 may",
        "https",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "window",
        "get file",
        "check mutex",
        "print debug",
        "get disk",
        "check",
        "enumerate gui",
        "create mutex",
        "query",
        "enumerate",
        "create shortcut",
        "capture",
        "get http",
        "windows nt",
        "request",
        "response",
        "number",
        "algorithm",
        "ja3s",
        "cus cnr3",
        "subject",
        "http requests",
        "samplepath",
        "runtime modules",
        "referrer",
        "threat network",
        "infrastructure",
        "historical ssl",
        "approach",
        "ta413",
        "tibetan targets",
        "vy binh",
        "march",
        "tulach",
        "114.114.114.114",
        "libreoffice.org",
        "as174 cogent",
        "china unknown",
        "china",
        "passive dns",
        "entries",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "twitter",
        "problems",
        "domainabuse",
        "creation date",
        "search",
        "domain",
        "domain name",
        "expiration date",
        "nanjing",
        "date",
        "all search",
        "trojan",
        "trojan features",
        "related pulses",
        "file samples",
        "files matching",
        "sort"
      ],
      "references": [
        "Ransomware\u00bbTrojanDownloader:Win32/Dalexis | FileHash-SHA256  01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
        "Antivirus Detections Win32:Filecoder-AD\\ [Trj] ,  Win.Malware.Cabby-6803812-0 ,  TrojanDownloader:Win32/Dalexis!rfn!rfn",
        "IDS Detections: Maktub Locker TOR Status Check TOR Consensus Data Requested TOR 1.0 Server Key Retrieval Tor Get Server Request TLS Handshake",
        "Domains Contacted: fbi.gov",
        "IP\u2019s Contacted:  104.16.149.244  128.31.0.39  131.188.40.189  14.200.177.98  148.251.79.57",
        "IP\u2019s Contacted: 185.220.100.255  199.249.230.142  199.254.238.52 23.128.248.20  45.58.156.76",
        "tulach.cc| 114.114.114.114 [public1.114dns.com] | thebrotherssabey | bian sabey under multiple WP & DGA domains , various titles , various roles",
        "External Hosts Top Country United States, Germany | IP Hostname: 104.16.149.244: fbi.gov | United States: AS13335 cloudflare",
        "Type Indicator Reason:  IPv4 104.16.149.244 In CDN range: provider=cloudflare  IPv4 131.188.40.189 IP Associated with Tor Exit Nodes",
        "Type Indicator Reason:  IPv4 192.168.56.108 Private IP Address:  IPv4 46.20.35.112 IP Associated with Tor Exit Nodes:  Domain: fbi.gov",
        "PE Anomalies: entropy_based | Yara Detections: Yara Detections stack_string | Stack_String: stack_string E\u000fEEEE\u000fEEEE\u000fEEEE\u000fEEEE\u000fEE\u000fEE\u000fEE\u000fEE\u000f",
        "DISA Entrypoint: call 0x41259b jmp 0x40b3ac int3 int3 int3 int3 int3 int3 int3 int3",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/01da63fd3b935be956657d8f7212e976c553a6e040d5db9592fab807441b3e32",
        "Alerts: dead_host network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http packer_entropy",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters raises_exception",
        "Alerts: queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name",
        "Interesting Strings: http://ns.adobe.com/xap/1.0/mm/ http://ns.adobe.com/xap/1.0/  http://ns.adobe.com/xap/1.0/sType/ResourceRef",
        "Interesting Strings: http://www.w3.org/1999/02/22",
        "Virus: \"ba30376f915afa868763f84299fae5d2.virus.rtf - LibreOffice Writer\"",
        "Cryptographical plain text c\ufffdh\u000f\u00107\ufffd\ufffd1Q\ufffd\u0286\ufffd\u0254E\ufffdW\u0014\ufffd\u0382\ufffd Rw\ufffde\ufffd\ufffd%\u000b\ufffd\ufffd\ufffdreudt\ufffd\ufffd\ufffd",
        "IDS: Matches rule ET JA3 Hash - Possible Malware - Dridex",
        "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 129, 750, 824, 439, 282, 820, 21 , 63, 896, 91, 11, 202, 684 919,31 ,156, 743",
        "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic Groups: 869, 42, 6, 443, 85, 416, 688, 117, 217, 217, 443, 709, 703, 879, 338, 682",
        "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "IDS:  Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "IDS: Matches rule POLICY-OTHER HTTP request by IPv4 address attempt Matches rule POLICY-OTHER TOR traffic anonymizer server request Matches rule ET POLICY TOR Consensus Data Requested Matches rule ET P2P Tor Get Server Request Matches rule ET P2P TOR 1.0 Server Key Retrieval",
        "IDS: Matches rule (http_inspect) white space before or between HTTP messages Matches rule SURICATA HTTP Request abnormal Content-Encoding",
        "Sigma: Matches rule Failed Code Integrity Checks by Thomas Patzke Matches rule Process Creation Using Sysnative Folder by Max Altgelt",
        "YARA Signature Match - THOR APT Scanner - RULE_AUTHOR: Florian Roth",
        "RULE: MAL_Agent_May20_1 RULE_SET: Livehunt - Default22 Indicators RULE_TYPE: VALHALLA rule feed only \u26a1- RULE_AUTHOR: Florian Roth",
        "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/MAL_Agent_May20_1 DESCRIPTION:",
        "Detects malware used in activity noticed  05/2020 likely related to Chinese actor",
        "REFERENCE: ACSC IOCs May 2020 pivoting RULE_AUTHOR: Florian Roth",
        "https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "114.114.114.114 IDS Detections DYNAMIC_DNS Query to a *.ns1.name Domain Query to a *.top domain - Likely Hostile Observed DNS Query to .work",
        "IP 114.114.114.114 Antivirus Detections: !#SIGATTR:IEProxyChange ,  ALF:Backdoor:Win64/Meterpreter.AB!MTB ,",
        "IP 114.114.114.114 Antivirus Detections: ALF:PUA:Block:VrBrothers.R!MTB ,  ALF:Trojan:MSIL/AgentTesla.KM ,  ALFPER:RefLoadApiHash ,",
        "IP 114.114.114.114 Antivirus Detections: Backdoor:Linux/Dofloo.A!MTB ,  Backdoor:Linux/Gafgyt.AF!MTB ,  Can't access file ,",
        "IP 114.114.114.114 Antivirus Detections: Trojan:Win32/Magania.DSK!MTB , TEL:SIGATTR:CreateRemoteThread",
        "IP 114.114.114.114 Domain 114dns.com: PegasusPlus",
        "Emails: pegasusplus@gmail.com Name: Zhao Zhenping Name Servers: NS1000.114DNS.COM Org: Nanjing XinFeng Network Technologies, Inc.",
        "Address:\tRoom 301, Building 3B, Startup park, High Tech park, Shiyang Road 56, Baixia District, Nanjing, Jiangsu, China City nan jing shi Country",
        "https://blog.malwarebytes.org/intelligence/2016/03/maktub-locker-beautiful-and-dangerous/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "China"
      ],
      "malware_families": [
        {
          "id": "Maktub Locker",
          "display_name": "Maktub Locker",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "display_name": "TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "target": "/malware/TrojanDownloader:Win32/Dalexis!rfn!rfn"
        },
        {
          "id": "Trojan:Win32/Magania",
          "display_name": "Trojan:Win32/Magania",
          "target": "/malware/Trojan:Win32/Magania"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1087",
          "name": "Account Discovery",
          "display_name": "T1087 - Account Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        }
      ],
      "industries": [
        "Government",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 182,
        "FileHash-SHA1": 199,
        "FileHash-SHA256": 2383,
        "domain": 395,
        "URL": 1382,
        "hostname": 699,
        "email": 2,
        "CVE": 1
      },
      "indicator_count": 5243,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "557 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "652a901fe2dbea9024b3d614",
      "name": "Black Tech",
      "description": "Found in a malicious Apple iTunes link. Lists several independent artists. Music \"producer\" is potentially highly dependent on use of AI generated instrumentation and conception.  Hacking seems to target a single target and associates.",
      "modified": "2024-09-24T00:01:38.502000",
      "created": "2023-10-14T12:57:03.183000",
      "tags": [
        "referrer",
        "historical ssl",
        "ssl certificate",
        "whois record",
        "whois ssl",
        "whois",
        "historical",
        "siblings parent",
        "network",
        "number",
        "label shanghai",
        "blue cloud",
        "ltd regional",
        "apnic country",
        "cn continent",
        "algorithm",
        "data",
        "v3 serial",
        "cus cndigicert",
        "basic rsa",
        "cn ca",
        "g2 odigicert",
        "inc validity",
        "oshanghai blue",
        "road",
        "beijing country",
        "beijing",
        "please",
        "apnic person",
        "cn phone",
        "whois lookup",
        "bluecloud descr",
        "shanghai blue",
        "ltd descr",
        "cnnic",
        "whois lookups",
        "updated date",
        "apnic netname",
        "beijing abusec",
        "abuse cnniccn",
        "liu registrant",
        "country",
        "dns replication",
        "date",
        "domain",
        "first",
        "blacklist https",
        "heur",
        "html",
        "malware",
        "alexa top",
        "site",
        "filerepmetagen",
        "suspected",
        "adware",
        "cisco umbrella",
        "malware site",
        "win64",
        "opencandy",
        "cleaner",
        "artemis",
        "iframe",
        "agent",
        "unsafe",
        "riskware",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "tiggre",
        "genkryptik",
        "exploit",
        "presenoker",
        "filetour",
        "conduit",
        "wacatac",
        "softcnapp",
        "xtrat",
        "cve201711882",
        "memscan",
        "phishing",
        "maltiverse",
        "zbot",
        "webtoolbar",
        "trojanspy",
        "million",
        "united",
        "phishing site",
        "malicious site",
        "proxy",
        "firehol",
        "detection list",
        "ip address",
        "blacklist",
        "safe site",
        "team",
        "fusioncore",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "alexa",
        "adposhel",
        "installpack",
        "xrat",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "download",
        "gamehack",
        "verdict",
        "falcon sandbox",
        "pattern match",
        "show",
        "file",
        "indicator",
        "ascii text",
        "appdata",
        "mitre att",
        "et tor",
        "known tor",
        "severity",
        "hybrid",
        "general",
        "misc attack",
        "beginstring",
        "script",
        "relayrouter",
        "exit",
        "node traffic",
        "null",
        "error",
        "unknown",
        "span",
        "body",
        "refresh",
        "class",
        "critical",
        "tools",
        "look",
        "verify",
        "restart",
        "click",
        "strings",
        "meta",
        "anonymizer",
        "team proxy",
        "host",
        "control server",
        "meterpreter",
        "dnspionage",
        "filerepmalware",
        "fakealert",
        "pony",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "patcher",
        "adload",
        "webcompanion",
        "seraph",
        "downloader",
        "generic",
        "dapato",
        "redline stealer",
        "beach research",
        "blacklist http",
        "generic malware",
        "fakedout threat",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "bundled",
        "dropped",
        "contacted",
        "most malicious",
        "server",
        "parent parent"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Behav",
          "display_name": "Behav",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 50,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2449,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 3441,
        "URL": 2044,
        "domain": 258,
        "hostname": 1100,
        "CIDR": 1,
        "email": 4,
        "CVE": 37
      },
      "indicator_count": 9551,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "572 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bca8fcbe62297d71b47c33",
      "name": "Ragnar Locker",
      "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
      "modified": "2024-03-03T08:00:03.432000",
      "created": "2024-02-02T08:34:04.425000",
      "tags": [
        "referrer",
        "contacted",
        "whois record",
        "ssl certificate",
        "whois whois",
        "contacted urls",
        "execution",
        "historical ssl",
        "red team",
        "gang breached",
        "agent tesla",
        "redline stealer",
        "metro",
        "android",
        "urls url",
        "files",
        "kgs0",
        "kls0",
        "orgtechhandle",
        "orgtechref",
        "orgabusehandle",
        "orgdnshandle",
        "orgdnsref",
        "whois lookup",
        "netrange",
        "nethandle",
        "net108",
        "net1080000",
        "communicating",
        "urls http",
        "ransomware gang",
        "breached",
        "team",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "psiusa",
        "domain robot",
        "porkbun llc",
        "keysystems gmbh",
        "csc corporate",
        "domains",
        "domain name",
        "network pty",
        "tucows",
        "com laude",
        "dynadot inc"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8354,
        "FileHash-MD5": 104,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 2711,
        "CIDR": 5,
        "CVE": 6,
        "domain": 1489,
        "hostname": 3058,
        "email": 5
      },
      "indicator_count": 15813,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fa5d085f721612e434395",
      "name": "Fali Attack \u2022 Tor Server \u2022 Apple Private Data Collection\u2192nr-data.net",
      "description": "Link below reads: OCTOSEEK URL ADD TO PULSE (http://199.249.230.162/tor/server/fp/f9674f45a25caa977e7b872807e0a070c121f5fa) FALSE. What the government allows, even if you have 'nothing to hide.'  Named target  in this pulse: Tsara Brashears isn't a criminal/suspect, is a subject aka target or topic. By accounts a physical therapist, working under quasi government umbrella, allegedly, injouriously SA'd target. Privileges that any accusation can illicit  a campaign of humiliation and spying.  Ridiculously obvious attack. Pornhub subsidiary  used to crack passwords , transactional government relationships w/Microsoft, Bing, Apple,, Assurant. Monitoring, bot networks, hidden cameras, reported, ignored threats, uninvestigated harm , intimidation, and malvertizing. The privilege abusers hack recklessly, exposing others. Government privilege accessors  systematically , openly abuse target in silencing effort. Avoidance of media exposure and financial consequence.",
      "modified": "2023-12-11T12:03:53.533000",
      "created": "2023-11-11T16:03:28.522000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "url http",
        "pulse pulses",
        "http",
        "ip address",
        "passive dns",
        "related nids",
        "urls",
        "win64",
        "win32",
        "as62744",
        "backdoor",
        "dangeroussig",
        "ipv4",
        "ssl certificate",
        "dropped",
        "contacted",
        "contacted urls",
        "anlise",
        "apple ios",
        "collection",
        "fali malicious",
        "whois whois",
        "whois record",
        "hacktool",
        "pattern match",
        "root ca",
        "done adding",
        "catalog file",
        "authority",
        "class",
        "mitre att",
        "ascii text",
        "indicator",
        "ck id",
        "date",
        "unknown",
        "error",
        "generator",
        "critical",
        "refresh",
        "body",
        "span",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "proxy avoidance",
        "anonymizers",
        "hallrender.com",
        "mark sabey",
        "spyware",
        "monitoring",
        "dumping",
        "hacking",
        "brian sabey",
        "threat",
        "Tsara brashears",
        "pulse as16509",
        "mirai"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/ee534a0e8a8bc013fadef020f518d44925b2adf0126444aee53b7a51aadfcb7a/654f6940ec2068706b0ae5ca",
        "Domain   nr-data.net                                                   (Apple Private Data Collection)",
        "Hostname www.bing.com                                         (pattern match)",
        "URL https://assets.msn.com/bundles/v1/homePage/latest/midlevel/vendors.ef7dde432bed42c1b7db.js.            (t .map \"pattern match\")",
        "Hostname www.pornhub.com                                (password cracker)",
        "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "Hostname vortex-nlb-http2-fed-us-taut-purple.nr-data.net",
        "URL   http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "FileHash-MD5 879623feffedf5672dffc85c269af125",
        "img-prod-cms-rt-microsoft-com.akamaized.net  (img-prod-cm Nagano east amazonaws)",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=  \t\t   (nr-data.net email collection contractual agreement)",
        "Hostname www.assurant.com                     (nr- data email collection from apple devices)",
        "http://url3308.macorva.com/asm/UNSUBSCRIBE/?user_id=10055259&data=bQ0N-GNp87vailMH8NcX8hVikM6oRFcaYffHPXNvHhxoMDAwdTAwMIZgp6VEcimR2OR6-FgE5LbQmvMKgBcNzfKlzFUlyGhihCTfgGNhqBwYspOmdyExodXueDIXSrpmprp7qqmciBoXxvis5p6MnzhFBM5DSEXvhwy8DunkXxGDBX-Jps3Ihyo3TwAwGKJrlBnUc9b0m9OrG0Gnn8WUnB94unMY8ZMOgaCblwprg85sSdpRgipzAMyP_KxiQKceH-blAFTSIxL5MCSDStpmbiQZ4hVBNMKVaD7KsxSMie09qyTXMdiTsBZv57uwBpGLwpsKyNyJRNDag3flmayRklZ3XkMkhxm8epKkbxiASkjL8XqOpRh1MYS92ivMoL0YvpNeaKc_svs=",
        "URL http://movies.waploaded.ng/search/Horse-Sex-Women.html                     (",
        "https://ftp.zedz.net/vir/Trojan-PSW.HTML.YahooLogon/",
        "time-a.nist.gov                     (DNS ipify Control)",
        "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Request\t2008113",
        "https://otx.alienvault.com/indicator/url/http://blacklist1.dnsblocklist.com",
        "https://otx.alienvault.com/indicator/url/http://cinefest.com/en/submissions/",
        "hostnameobject.prototype.hasownproperty.call.     (API commands to newly acquired property of target and family)",
        "e.call    (API call invasion)",
        "t.call    (targets communication storage)",
        "https://app.call-em-all.com/broadcasts/all/login?redirect=/broadcasts/all",
        "http://call-em-all.com/DeleteNumberFromBroadcast.       (Brutes)",
        "http://call-em-all.com/AddNumbersToBroadcast",
        "http://call-em-all.com/AddPersonsToList",
        "http://call-em-all.com/GetAccountKeywords",
        "http://call-em-all.com/CheckPhoneNumber",
        "http://call-em-all.com/GetSMSOptIns",
        "http://call-em-all.com/UpdateAccountInfo",
        "http://call-em-all.com/InsertCustomCall",
        "http://call-em-all.com/GetSchedules",
        "ec2-35-161-55-221.us-west-2.compute.amazonaws.com.     (Boardman, Oregon)",
        "Detections Potential SSH Scan OUTBOUND",
        "Tor Get Server Request",
        "monitoring.akhavan.pro"
      ],
      "public": 1,
      "adversary": "local -> 199.249.230.162:80 (TCP)\tPotential Corporate Privacy Violation\tET P2P Tor Get Server Reques",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Generic",
          "display_name": "Trojan.Generic",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan X",
          "display_name": "Trojan X",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Konus.A",
          "display_name": "Backdoor:Win32/Konus.A",
          "target": "/malware/Backdoor:Win32/Konus.A"
        },
        {
          "id": "Win.Malware.Ulise-9886066-0",
          "display_name": "Win.Malware.Ulise-9886066-0",
          "target": null
        },
        {
          "id": "Win32:DangerousSig\\ [Trj]",
          "display_name": "Win32:DangerousSig\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win64:TrojanX-gen\\ [Trj]",
          "display_name": "Win64:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Fali",
          "display_name": "Fali",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ELF:Mirai-SJ\\ Trj",
          "display_name": "ELF:Mirai-SJ\\ Trj",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1573.002",
          "name": "Asymmetric Cryptography",
          "display_name": "T1573.002 - Asymmetric Cryptography"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 64,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 2276,
        "URL": 5992,
        "hostname": 1025,
        "domain": 330,
        "CVE": 1
      },
      "indicator_count": 9901,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://block2.mmms.eu",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://block2.mmms.eu",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641543.3625224
}