{
  "type": "URL",
  "indicator": "https://bv.longshu.tk",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://bv.longshu.tk",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4136927166,
      "indicator": "https://bv.longshu.tk",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "69b7241a63b7527ac2b04d60",
          "name": "DoD_Cyber_Strategy | Umbald.A | Patched3_c.AKRV | DoD | Navy.mil extensions | Adult Content distribution [msudosos IoCs connects to]",
          "description": "I became curious about an IoC found in a Pulse labeled \u2018undefined\u2019  by msudosos notated in  references and in parenthesis below this text. I did deep research on msudosos IoC. \nhttps://www.cybercom.mil/Portals/56/Document\ns/Strategy/DoD_Cyber_Strategy_2023.pdf | Apparent cyber warfare. Distribution of pornography potentially. The only use I have seen the type of attacks used for is reputation damage. | I am going to stick with the \u2018undefined\u2019 label given by msudosos because I don\u2019t know the purpose for the alleged Navy. mil & DoD for porn distribution. It\u2019s not to ensnare child predators. Possibly quasi government access to deter potential claimants. Possible hacker involvement. Going with \u2018undefined\u2019 for the moment.\n\n[444ea032708bb0d940de0ef72b944244 | credit msudosos || Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244]",
          "modified": "2026-04-14T18:06:37.524000",
          "created": "2026-03-15T21:26:50.218000",
          "tags": [
            "man software",
            "destination",
            "port",
            "united",
            "delete",
            "read c",
            "virustotal",
            "patched3_c.akrv",
            "armadillov171",
            "dod",
            "thinkman",
            "win32",
            "trojan",
            "present mar",
            "backdoor",
            "urls",
            "files",
            "unknown",
            "search",
            "china as23724",
            "asnone",
            "artemis",
            "zeppelin",
            "drweb",
            "vipre",
            "panda",
            "malware",
            "suspicious",
            "cloud",
            "logic",
            "et trojan",
            "et info",
            "download",
            "windows",
            "embeddedwb",
            "shellexecuteexw",
            "msie",
            "windows nt",
            "writeconsolew",
            "displayname",
            "service",
            "ids detections",
            "yara detections",
            "crypt",
            "medium",
            "whitelisted",
            "passive dns",
            "worm",
            "mtb may",
            "mtb aug",
            "otx logo",
            "all ipv4",
            "pulse pulses",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "high",
            "reg add",
            "regsz d",
            "write",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "pe packer",
            "pm size",
            "pehash",
            "richhash",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "over",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "pattern match",
            "null",
            "span",
            "error",
            "body",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "refresh",
            "tools",
            "title",
            "show technique",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "navy",
            "reputation",
            "adult content",
            "cyber warfare"
          ],
          "references": [
            "AVDetections:  Patched3_c.AKRV",
            "Yara Detections: Armadillov171",
            "Alerts: antiav_servicestop persistence_autorun network_bind antivirus_virustotal network_http",
            "IP\u2019s Contacted:  8.8.8.8  78.46.218.253  74.208.229.157  192.5.41.40",
            "Contacted Domains:  tick.usno.navy.mil www.thinkman.com",
            "AS27064 DOD Network Information Center? |  192.5.41.40 | tick.usno.navy.mil tick.usno.navy.mil | United States",
            "AS8560 1&1 ionos se | 74.208.229.157 | www.thinkman.com\twww.thinkman.com | United States",
            "AS24940 hetzner online gmbh |78.46.218.253\t | static.253.218.46.78.clients.your-server.de | Germany",
            "AS15169 google llc  | 8.8.8.8\t| dns.google | United States",
            "Email: d4@thinkman.com",
            "Domain: navy.mil DNS Files IP Address: 192.5.41.40 Location: United States",
            "ASN AS27064 dod network information center",
            "Nameservers: dns5.disa.mil. ,  dns4.disa.mil. ,  squad.navo.mil. ,  crnaone.navy.mil. ,  dns1.disa.mil.",
            "Nameservers: squid.navo. ,  squid.navo.mil. ,  dns2.disa.mil. ,  minnow.navo. ,  navy.mil. ,  dns3.disa.mil.",
            "tick.usno.navy.mil , navy.mil: trojan:Win32/Tiggre!rfn Win.Trojan.Rootkit-4668 Win32:Agent-ALXE\\ [Rtk] Win32:Malware-gen",
            "TrojanDownloader:Win32/Umbald.A\tMalware infection",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "Alerts: nolookup_communication persistence_autorun bypass_firewall network_http p2p_cnc",
            "Alerts: allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process",
            "Alerts: stealth_window packer_entropy uses_windows_utilities",
            "Alerts: console_output antivm_memory_available pe_features",
            "Yara Detections: MS_Visual_Basic_6_0",
            "Alerts: process_creation_suspicious_location injection_write_exe_process persistence_autorun",
            "Alerts: procmem_yara static_pe_anomaly deletes_executed_files injection_runpe",
            "Alerts: mouse_movement_detect dynamic_function_loading resumethread_remote_process",
            "Alerts:  injection_write_process reads_self stealth_window injection_rwx uses_windows_utilities",
            "Alerts:  queries_user_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter dll_load_uncommon_file_types",
            "porn.nonstopvideos.pl \u2022 xxx-xvideo.com \u2022 essexmetals.com",
            "http://www.aerix.com/__media__/js/netsoltrademark.php?d=www.pornxxxgals.info/latex-porn/",
            "navy.mil \u2022 http://acts.navair.navy.mil \u2022  http://logistics.navair.navy.mil/rcm/",
            "https://www.cloud.mil/CVRC:/Users/joshua.colliflower/OneDrive/OneDrive%20-%20United%20States%20Department%20of%20the%20Navy/Documents/Archive%20Miscellaneous",
            "192.5.41.40 scanning_host\t\u2022 74.208.229.157 scanning_host",
            "444ea032708bb0d940de0ef72b944244 | credit msudosos",
            "Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244",
            "https://otx.alienvault.com/pulse/69b65d6a27024117a4cd3540 [credit msudosos]",
            "https://www.cybercom.mil/Portals/56/Documents/Strategy/DoD_Cyber_Strategy_2023.pdf",
            "DoD related:  192.5.41.40 scanning_host\t140.19.33.126 \u2022 199.9.2.136 \u2022 214.23.15.26",
            "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6edod--a.gif",
            "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6efyLw9|dod--a | (205.162.40.0/21) (Omeda Communications )",
            "205.162.42.171 (205.162.40.0/21) AS 53866 ( Omeda Communications )",
            "https://exchange.simply.ms/owa/auth/logon.aspx?url=https://exchange.simply.ms/owa/&reason=0",
            "mailbox.co.za",
            "fmx32.aig.com \u2022  167.230.105.81",
            "https://otx.alienvault.com/indicator/url/https://gossip.thedirty.com/cdn-cgi/l/chk_jschl?s=04e9c17f33a895764287ae3918f54f016b353177-1551745661-1800-AWU4eGCIAWcUFRuFo2RAigESClCdCQ/9FJquPKplzHISR2zmIZSTluV/jEDBqANqdDORIXIACOwCScDYumaSt5kRHUKVAK4z6Wlo0HzAhetn"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Patched3_c.AKRV",
              "display_name": "Patched3_c.AKRV",
              "target": null
            },
            {
              "id": "Win32:Agent-ALXE\\ [Rtk]",
              "display_name": "Win32:Agent-ALXE\\ [Rtk]",
              "target": null
            },
            {
              "id": "Win.Trojan.Rootkit-4668",
              "display_name": "Win.Trojan.Rootkit-4668",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre!rfn",
              "display_name": "Trojan:Win32/Tiggre!rfn",
              "target": "/malware/Trojan:Win32/Tiggre!rfn"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Inject2.BIVE",
              "display_name": "Inject2.BIVE",
              "target": null
            },
            {
              "id": "Crypt3.CHZW",
              "display_name": "Crypt3.CHZW",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BXMJ",
              "display_name": "Crypt3.BXMJ",
              "target": null
            },
            {
              "id": "Crypt3.BOQD\t\t Inject2.BHBW",
              "display_name": "Crypt3.BOQD\t\t Inject2.BHBW",
              "target": null
            },
            {
              "id": "Crypt3.BMVU",
              "display_name": "Crypt3.BMVU",
              "target": null
            },
            {
              "id": "Trojan.DownLoader12.43161",
              "display_name": "Trojan.DownLoader12.43161",
              "target": null
            },
            {
              "id": "HEUR/UnSec",
              "display_name": "HEUR/UnSec",
              "target": null
            },
            {
              "id": "ET Trojan",
              "display_name": "ET Trojan",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Umbald.A",
              "display_name": "TrojanDownloader:Win32/Umbald.A",
              "target": "/malware/TrojanDownloader:Win32/Umbald.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1048.001",
              "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
              "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [
            "Government",
            "Military",
            "Defense",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 165,
            "FileHash-SHA1": 165,
            "FileHash-SHA256": 3524,
            "URL": 11424,
            "email": 1,
            "hostname": 3954,
            "domain": 2523
          },
          "indicator_count": 21756,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a1a73eb0578b92962dae97",
          "name": "FBI Link (Ransomware)sent to a device. opened on its own. Why?",
          "description": "I wouldn\u2019t typically search an alleged authentic government site , except it opened on a device, no prompt. TrojanDownloader:Win32/Dalexis!rfn!rfn\nIDS Detections\nMaktub Locker TOR Status Check\nTOR Consensus Data Requested\nTOR 1.0 Server Key Retrieval\nTor Get Server Request\nTLS Handshake Failure\nYara Detections\nstack_string\nWho is : [URL\n[https://tor-dirauth.sebastianhahn.net/]\n[https://tor.sebastianhahn.net]\n[tor-dirauth.sebastianhahn.net]\n->gitbot.faui2k9.de\n[Status faui2k9.de -connect] connects to device \n100% Malicious | https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70 |  [External resources discovered in HTML content:\ndap.digitalgov.gov | Pattern match: \"fbi.gov/contact-us/field-offices/denver/news/pr\"\nHeuristic match: \"x.com\" | will revisit",
          "modified": "2026-03-29T13:04:34.750000",
          "created": "2026-02-27T14:16:30.498000",
          "tags": [
            "regopenkeyexw",
            "port",
            "destination",
            "cryptexportkey",
            "search",
            "show",
            "entries",
            "windows nt",
            "regsetvalueexa",
            "ip address",
            "malware",
            "copy",
            "write",
            "win32",
            "next",
            "format",
            "contacted",
            "less ip",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "date",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "february",
            "failed",
            "enter",
            "data upload",
            "passive dns",
            "urls",
            "aaaa",
            "certificate",
            "otx logo",
            "all hostname",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "title",
            "body",
            "encrypt",
            "netherlands",
            "gmt content",
            "all ipv4",
            "amsterdam",
            "hetzner online",
            "gmbh",
            "summary",
            "url age",
            "de seen",
            "general info",
            "geo germany",
            "as as24940",
            "de note",
            "route",
            "direct",
            "pro platform",
            "logs",
            "suricata alert",
            "et info",
            "tls handshake",
            "bad traffic",
            "suricata alerts",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "size",
            "sha256",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "path",
            "unknown",
            "stop",
            "root",
            "hybrid",
            "general",
            "local",
            "form",
            "click",
            "strings",
            "9999",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "show technique",
            "ck matrix",
            "href",
            "antivirus",
            "maktub locker",
            "tor status",
            "check"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1129,
            "domain": 148,
            "hostname": 753,
            "FileHash-SHA256": 548,
            "FileHash-MD5": 90,
            "FileHash-SHA1": 71,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "email": 4
          },
          "indicator_count": 2752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6961a8ed7b492f9e0ba38990",
          "name": "HeartSender.A and other Malware attacks originating from Palantirs Pahamify Pegasus",
          "description": "Pahamify Pegasus : HackTool \u2022 Speedcat \u2022 HeartSender.A \u2022 Zbot and other malware found.\nSearc begins with single FileHash referenced below. \nI\u2019m checking the processes and sharing it here one group at a time. Too much research at once could bring Amazon AWS down. Again.",
          "modified": "2026-02-09T00:04:37.974000",
          "created": "2026-01-10T01:18:36.999000",
          "tags": [
            "read c",
            "write c",
            "port",
            "destination",
            "united",
            "medium",
            "as16509",
            "memcommit",
            "write",
            "execution",
            "dock",
            "persistence",
            "next executed",
            "commands graph",
            "tree",
            "sample hash",
            "passive dns",
            "present jan",
            "title error",
            "urls",
            "files",
            "date hash",
            "avast avg",
            "dynamicloader",
            "host",
            "utf8",
            "unicode text",
            "crlf line",
            "binary resource",
            "ms windows",
            "search",
            "intel",
            "pcspeedcat",
            "win32",
            "internal",
            "malware",
            "local",
            "unknown",
            "get na",
            "http",
            "okrnserver",
            "ip address",
            "http traffic",
            "guard",
            "powershell",
            "ipv4 add",
            "servers",
            "name servers",
            "capture",
            "link",
            "gateway",
            "tofsee att",
            "ck ids",
            "t1055",
            "injection",
            "t1071",
            "protocol",
            "t1573",
            "target",
            "url http",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "t1480 execution",
            "discovery att",
            "mitre att",
            "ck matrix",
            "ascii text",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "high",
            "etpro malware",
            "next",
            "stack",
            "format",
            "error",
            "unicode",
            "head http",
            "regsetvalueexa",
            "qt binary",
            "resource file",
            "pe32",
            "hostile",
            "unknown aaaa",
            "unknown ns",
            "x content",
            "gmt cache",
            "domain add",
            "title",
            "present sep",
            "a td",
            "td tr",
            "dir td",
            "td td",
            "present may",
            "present jun",
            "present apr",
            "present aug",
            "present oct",
            "head body",
            "gmt server",
            "index",
            "main",
            "accept",
            "status",
            "th tr",
            "moved",
            "record value",
            "expiration date",
            "germany unknown",
            "present dec",
            "cache control",
            "present nov",
            "max age1000000",
            "cookie",
            "hosting",
            "reverse dns",
            "location france",
            "france asn",
            "as16276",
            "trojandropper",
            "next associated",
            "mtb jan",
            "exploit",
            "emails",
            "trojan",
            "pegasus",
            "hostname add",
            "url analysis",
            "domain",
            "files ip",
            "address",
            "france unknown",
            "asn as16276",
            "backdoor",
            "entries",
            "setcookie",
            "twitter",
            "refloadapihash",
            "virtool",
            "show",
            "displayname",
            "windows",
            "rndhex",
            "tofsee",
            "stream",
            "encrypt",
            "push",
            "creation date",
            "france",
            "date",
            "body",
            "pup",
            "amazon",
            "amazon aws",
            "salesforce",
            "herokuappdev",
            "google",
            "igoogle",
            "monitored target",
            "cats"
          ],
          "references": [
            "FileHash-SHA256\t9f66cab9d7c581cf2dd28b6ae3178bb3d38975ff257c3ffb67c3e89d0f7135ee",
            "https://otx.alienvault.com/indicator/ip/3.163.24.10",
            "External Hosts: 52.57.183.74\t access.pcspeedcat.com\taccess.pcspeedcat.com\tGermany\tAS16509 amazon.com inc\taccess.pcspeedcat.com Germany AS16509 amazon.",
            "External Hosts: 3.163.24.10\t www.pcspeedcat.com\twww.pcspeedcat.com\tUnited States ASNone",
            "https://otx.alienvault.com/indicator/hostname/pegasus.pahamify.com",
            "https://otx.alienvault.com/indicator/url/https://pegasus.pahamify.com/",
            "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
            "http://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
            "biblegateway.comwww.biblegateway.com \u2022 www.biblegateway.com",
            "Malicious Application Development: herokuappdev.com  (Patter match 8 years +)",
            "direwolf-8b1a1bc476.staging.herokuappdev.com",
            "Malicious Application Development: herokuappdev.com (pattern matching spans 8+ years)"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Generic-9871124-0",
              "display_name": "Win.Malware.Generic-9871124-0",
              "target": null
            },
            {
              "id": "ALF:HackTool:MSIL/HeartSender.A",
              "display_name": "ALF:HackTool:MSIL/HeartSender.A",
              "target": null
            },
            {
              "id": "Win.Malware.Speedcat-6957425",
              "display_name": "Win.Malware.Speedcat-6957425",
              "target": null
            },
            {
              "id": "Tofsee Attack",
              "display_name": "Tofsee Attack",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1192",
              "name": "Spearphishing Link",
              "display_name": "T1192 - Spearphishing Link"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 404,
            "FileHash-SHA1": 286,
            "FileHash-SHA256": 1419,
            "SSLCertFingerprint": 7,
            "domain": 441,
            "URL": 4233,
            "hostname": 1217,
            "email": 10
          },
          "indicator_count": 8017,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "69 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6946fdbb4a22dc28d60d6ca2",
          "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
          "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
          "modified": "2026-01-19T19:04:41.997000",
          "created": "2025-12-20T19:49:15.713000",
          "tags": [
            "doomscroller",
            "browsehappy",
            "xpirat",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "united",
            "tlsv1",
            "execution",
            "dock",
            "write",
            "persistence",
            "encrypt",
            "meta",
            "browse happy",
            "worry",
            "body doctype",
            "online",
            "gmt server",
            "a domains",
            "ipv4 add",
            "win32",
            "trojandropper",
            "title",
            "date",
            "unknown",
            "post http",
            "cryptexportkey",
            "cryptgenkey",
            "calgrc4",
            "expiro",
            "temple",
            "xserver",
            "adversaries",
            "worry wordpress"
          ],
          "references": [
            "Xpirat = doomscroller.io"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Xpirat",
              "display_name": "Xpirat",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5576,
            "domain": 1502,
            "FileHash-MD5": 116,
            "FileHash-SHA1": 73,
            "FileHash-SHA256": 1041,
            "SSLCertFingerprint": 1,
            "hostname": 1951
          },
          "indicator_count": 10260,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "89 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68dd9423f9208dcc8701e12e",
          "name": "Maktub Locker TOR Status Check \u2022 Cab \\ Drive by( dbi.com) Malicious pic",
          "description": "After 911 told me I was bounced to the Denver, Co Station 5 , located 45 & Peoria in Denver , Colorado , not even close. \nThe phone number changed, only 911 access. Clue: I saw an Amber alert in n target phone when I powered it on. No all notices always turned off. Made a call\non contact list and screen changed to a plain faced interface. \n\nAfter finding a mother foundry link on targets phone I grew curious about a CEO\u2019s strange story of Palantir\u2019s Karp Theil roommate situation in Law School but I could only find one picture on of them on a campus in their late 40\u2019s. He\u2019s African American mixed. The picture of his mother in hacked phone is 215 yo. No information federal oversight as CEO right? Or limited information on crazy hacked device? \n\nClicked on link then OMGness\n\n#whatIfind #onhackeddevice #targeting",
          "modified": "2025-10-31T19:03:21.338000",
          "created": "2025-10-01T20:50:43.002000",
          "tags": [
            "iocs",
            "logo",
            "passive dns",
            "related tags",
            "none google",
            "ipv4",
            "gogle",
            "twitter",
            "x.com",
            "ransomware",
            "fbi \u2019site\u2019",
            "python",
            "cloud",
            "regopenkeyexw",
            "read c",
            "port",
            "destination",
            "cryptexportkey",
            "count read",
            "tor get",
            "malware",
            "write",
            "format",
            "redacted for",
            "server",
            "privacy tech",
            "privacy admin",
            "country",
            "postal code",
            "organization",
            "date",
            "email",
            "code",
            "aaaa",
            "value a",
            "key identifier",
            "v3 serial",
            "number",
            "cus ogoogle",
            "trust",
            "cnwe1 validity",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "maktub",
            "cnc",
            "python-projekt",
            "x post",
            "link",
            "android",
            "iphone",
            "google",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "spawns",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "mitre att",
            "show technique",
            "ck matrix",
            "title",
            "path",
            "hybrid",
            "general",
            "local",
            "form",
            "click",
            "strings",
            "body"
          ],
          "references": [
            "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
            "Entity CLOUD14",
            "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
            "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
            "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
            "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
            "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
            "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
            "Yara Detections: stack_string Alerts: dead_host",
            "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
            "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
            "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Code Virus Ransomware",
              "display_name": "Code Virus Ransomware",
              "target": null
            },
            {
              "id": "AVAST- Win32:Filecoder-AD\\ [Trj]",
              "display_name": "AVAST- Win32:Filecoder-AD\\ [Trj]",
              "target": null
            },
            {
              "id": "CLAMAV - Win.Malware.Cabby-6803812",
              "display_name": "CLAMAV - Win.Malware.Cabby-6803812",
              "target": null
            },
            {
              "id": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "display_name": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
              "target": "/malware/Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 574,
            "domain": 147,
            "FileHash-MD5": 156,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 539,
            "URL": 982,
            "SSLCertFingerprint": 4,
            "email": 2
          },
          "indicator_count": 2534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "169 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts: process_creation_suspicious_location injection_write_exe_process persistence_autorun",
        "biblegateway.comwww.biblegateway.com \u2022 www.biblegateway.com",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6edod--a.gif",
        "Nameservers: squid.navo. ,  squid.navo.mil. ,  dns2.disa.mil. ,  minnow.navo. ,  navy.mil. ,  dns3.disa.mil.",
        "mailbox.co.za",
        "fmx32.aig.com \u2022  167.230.105.81",
        "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
        "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception",
        "http://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "TrojanDownloader:Win32/Umbald.A\tMalware infection",
        "AS8560 1&1 ionos se | 74.208.229.157 | www.thinkman.com\twww.thinkman.com | United States",
        "https://www.cybercom.mil/Portals/56/Documents/Strategy/DoD_Cyber_Strategy_2023.pdf",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6efyLw9|dod--a | (205.162.40.0/21) (Omeda Communications )",
        "https://otx.alienvault.com/indicator/ip/3.163.24.10",
        "Alerts: stealth_window packer_entropy uses_windows_utilities",
        "DoD related:  192.5.41.40 scanning_host\t140.19.33.126 \u2022 199.9.2.136 \u2022 214.23.15.26",
        "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "Contacted Domains:  tick.usno.navy.mil www.thinkman.com",
        "Email: d4@thinkman.com",
        "tick.usno.navy.mil , navy.mil: trojan:Win32/Tiggre!rfn Win.Trojan.Rootkit-4668 Win32:Agent-ALXE\\ [Rtk] Win32:Malware-gen",
        "Alerts: allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process",
        "Alerts:  queries_user_name queries_keyboard_layout queries_locale_api",
        "porn.nonstopvideos.pl \u2022 xxx-xvideo.com \u2022 essexmetals.com",
        "FileHash-SHA256\t9f66cab9d7c581cf2dd28b6ae3178bb3d38975ff257c3ffb67c3e89d0f7135ee",
        "Entity CLOUD14",
        "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
        "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
        "Nameservers: dns5.disa.mil. ,  dns4.disa.mil. ,  squad.navo.mil. ,  crnaone.navy.mil. ,  dns1.disa.mil.",
        "192.5.41.40 scanning_host\t\u2022 74.208.229.157 scanning_host",
        "Malicious Application Development: herokuappdev.com (pattern matching spans 8+ years)",
        "Yara Detections: stack_string Alerts: dead_host",
        "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
        "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
        "https://otx.alienvault.com/indicator/url/https://pegasus.pahamify.com/",
        "Xpirat = doomscroller.io",
        "Alerts:  injection_write_process reads_self stealth_window injection_rwx uses_windows_utilities",
        "Malicious Application Development: herokuappdev.com  (Patter match 8 years +)",
        "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
        "External Hosts: 3.163.24.10\t www.pcspeedcat.com\twww.pcspeedcat.com\tUnited States ASNone",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
        "https://otx.alienvault.com/indicator/url/https://gossip.thedirty.com/cdn-cgi/l/chk_jschl?s=04e9c17f33a895764287ae3918f54f016b353177-1551745661-1800-AWU4eGCIAWcUFRuFo2RAigESClCdCQ/9FJquPKplzHISR2zmIZSTluV/jEDBqANqdDORIXIACOwCScDYumaSt5kRHUKVAK4z6Wlo0HzAhetn",
        "Alerts: console_output antivm_memory_available pe_features",
        "Alerts: antidebug_setunhandledexceptionfilter dll_load_uncommon_file_types",
        "AS24940 hetzner online gmbh |78.46.218.253\t | static.253.218.46.78.clients.your-server.de | Germany",
        "205.162.42.171 (205.162.40.0/21) AS 53866 ( Omeda Communications )",
        "ASN AS27064 dod network information center",
        "https://otx.alienvault.com/pulse/69b65d6a27024117a4cd3540 [credit msudosos]",
        "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
        "AVDetections:  Patched3_c.AKRV",
        "https://www.cloud.mil/CVRC:/Users/joshua.colliflower/OneDrive/OneDrive%20-%20United%20States%20Department%20of%20the%20Navy/Documents/Archive%20Miscellaneous",
        "IP\u2019s Contacted:  8.8.8.8  78.46.218.253  74.208.229.157  192.5.41.40",
        "AS15169 google llc  | 8.8.8.8\t| dns.google | United States",
        "Alerts: mouse_movement_detect dynamic_function_loading resumethread_remote_process",
        "http://www.aerix.com/__media__/js/netsoltrademark.php?d=www.pornxxxgals.info/latex-porn/",
        "https://otx.alienvault.com/indicator/hostname/pegasus.pahamify.com",
        "444ea032708bb0d940de0ef72b944244 | credit msudosos",
        "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
        "https://exchange.simply.ms/owa/auth/logon.aspx?url=https://exchange.simply.ms/owa/&reason=0",
        "navy.mil \u2022 http://acts.navair.navy.mil \u2022  http://logistics.navair.navy.mil/rcm/",
        "Alerts: procmem_yara static_pe_anomaly deletes_executed_files injection_runpe",
        "Domain: navy.mil DNS Files IP Address: 192.5.41.40 Location: United States",
        "External Hosts: 52.57.183.74\t access.pcspeedcat.com\taccess.pcspeedcat.com\tGermany\tAS16509 amazon.com inc\taccess.pcspeedcat.com Germany AS16509 amazon.",
        "Alerts: antiav_servicestop persistence_autorun network_bind antivirus_virustotal network_http",
        "Alerts: nolookup_communication persistence_autorun bypass_firewall network_http p2p_cnc",
        "Yara Detections: MS_Visual_Basic_6_0",
        "direwolf-8b1a1bc476.staging.herokuappdev.com",
        "Yara Detections: Armadillov171",
        "Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244",
        "AS27064 DOD Network Information Center? |  192.5.41.40 | tick.usno.navy.mil tick.usno.navy.mil | United States"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.speedcat-6957425",
            "Alf:hacktool:msil/heartsender.a",
            "Tofsee attack",
            "Code virus ransomware",
            "Xpirat",
            "Clamav - win.malware.cabby-6803812",
            "Crypt3.boqd\t\t inject2.bhbw",
            "Expiro",
            "Ms defender - trojandownloader:win32/dalexis!rfn!rfn",
            "Crypt3.chzw",
            "Win32:agent-alxe\\ [rtk]",
            "Et trojan",
            "Inject2.bive",
            "Trojan.downloader12.43161",
            "Win.trojan.rootkit-4668",
            "Crypt3.bxmj",
            "Win32:trojan-gen",
            "Patched3_c.akrv",
            "Win32:malware-gen",
            "Avast- win32:filecoder-ad\\ [trj]",
            "Crypt3.bmvu",
            "Zbot",
            "Backdoor:win32/tofsee.t",
            "Trojandownloader:win32/umbald.a",
            "Crypt3.bxvc",
            "Heur/unsec",
            "Trojan:win32/tiggre!rfn",
            "Win.malware.generic-9871124-0"
          ],
          "industries": [
            "Telecommunications",
            "Insurance",
            "Civil society",
            "Technology",
            "Defense",
            "Government",
            "Military"
          ],
          "unique_indicators": 43476
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/longshu.tk",
    "whois": "http://whois.domaintools.com/longshu.tk",
    "domain": "longshu.tk",
    "hostname": "bv.longshu.tk"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "69b7241a63b7527ac2b04d60",
      "name": "DoD_Cyber_Strategy | Umbald.A | Patched3_c.AKRV | DoD | Navy.mil extensions | Adult Content distribution [msudosos IoCs connects to]",
      "description": "I became curious about an IoC found in a Pulse labeled \u2018undefined\u2019  by msudosos notated in  references and in parenthesis below this text. I did deep research on msudosos IoC. \nhttps://www.cybercom.mil/Portals/56/Document\ns/Strategy/DoD_Cyber_Strategy_2023.pdf | Apparent cyber warfare. Distribution of pornography potentially. The only use I have seen the type of attacks used for is reputation damage. | I am going to stick with the \u2018undefined\u2019 label given by msudosos because I don\u2019t know the purpose for the alleged Navy. mil & DoD for porn distribution. It\u2019s not to ensnare child predators. Possibly quasi government access to deter potential claimants. Possible hacker involvement. Going with \u2018undefined\u2019 for the moment.\n\n[444ea032708bb0d940de0ef72b944244 | credit msudosos || Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244]",
      "modified": "2026-04-14T18:06:37.524000",
      "created": "2026-03-15T21:26:50.218000",
      "tags": [
        "man software",
        "destination",
        "port",
        "united",
        "delete",
        "read c",
        "virustotal",
        "patched3_c.akrv",
        "armadillov171",
        "dod",
        "thinkman",
        "win32",
        "trojan",
        "present mar",
        "backdoor",
        "urls",
        "files",
        "unknown",
        "search",
        "china as23724",
        "asnone",
        "artemis",
        "zeppelin",
        "drweb",
        "vipre",
        "panda",
        "malware",
        "suspicious",
        "cloud",
        "logic",
        "et trojan",
        "et info",
        "download",
        "windows",
        "embeddedwb",
        "shellexecuteexw",
        "msie",
        "windows nt",
        "writeconsolew",
        "displayname",
        "service",
        "ids detections",
        "yara detections",
        "crypt",
        "medium",
        "whitelisted",
        "passive dns",
        "worm",
        "mtb may",
        "mtb aug",
        "otx logo",
        "all ipv4",
        "pulse pulses",
        "dynamicloader",
        "yara rule",
        "ff d5",
        "high",
        "reg add",
        "regsz d",
        "write",
        "file type",
        "pexe",
        "pe32",
        "intel",
        "ms windows",
        "pe packer",
        "pm size",
        "pehash",
        "richhash",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "over",
        "sha256",
        "sha1",
        "ascii text",
        "size",
        "mitre att",
        "pattern match",
        "null",
        "span",
        "error",
        "body",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "refresh",
        "tools",
        "title",
        "show technique",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "navy",
        "reputation",
        "adult content",
        "cyber warfare"
      ],
      "references": [
        "AVDetections:  Patched3_c.AKRV",
        "Yara Detections: Armadillov171",
        "Alerts: antiav_servicestop persistence_autorun network_bind antivirus_virustotal network_http",
        "IP\u2019s Contacted:  8.8.8.8  78.46.218.253  74.208.229.157  192.5.41.40",
        "Contacted Domains:  tick.usno.navy.mil www.thinkman.com",
        "AS27064 DOD Network Information Center? |  192.5.41.40 | tick.usno.navy.mil tick.usno.navy.mil | United States",
        "AS8560 1&1 ionos se | 74.208.229.157 | www.thinkman.com\twww.thinkman.com | United States",
        "AS24940 hetzner online gmbh |78.46.218.253\t | static.253.218.46.78.clients.your-server.de | Germany",
        "AS15169 google llc  | 8.8.8.8\t| dns.google | United States",
        "Email: d4@thinkman.com",
        "Domain: navy.mil DNS Files IP Address: 192.5.41.40 Location: United States",
        "ASN AS27064 dod network information center",
        "Nameservers: dns5.disa.mil. ,  dns4.disa.mil. ,  squad.navo.mil. ,  crnaone.navy.mil. ,  dns1.disa.mil.",
        "Nameservers: squid.navo. ,  squid.navo.mil. ,  dns2.disa.mil. ,  minnow.navo. ,  navy.mil. ,  dns3.disa.mil.",
        "tick.usno.navy.mil , navy.mil: trojan:Win32/Tiggre!rfn Win.Trojan.Rootkit-4668 Win32:Agent-ALXE\\ [Rtk] Win32:Malware-gen",
        "TrojanDownloader:Win32/Umbald.A\tMalware infection",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "Alerts: nolookup_communication persistence_autorun bypass_firewall network_http p2p_cnc",
        "Alerts: allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process",
        "Alerts: stealth_window packer_entropy uses_windows_utilities",
        "Alerts: console_output antivm_memory_available pe_features",
        "Yara Detections: MS_Visual_Basic_6_0",
        "Alerts: process_creation_suspicious_location injection_write_exe_process persistence_autorun",
        "Alerts: procmem_yara static_pe_anomaly deletes_executed_files injection_runpe",
        "Alerts: mouse_movement_detect dynamic_function_loading resumethread_remote_process",
        "Alerts:  injection_write_process reads_self stealth_window injection_rwx uses_windows_utilities",
        "Alerts:  queries_user_name queries_keyboard_layout queries_locale_api",
        "Alerts: antidebug_setunhandledexceptionfilter dll_load_uncommon_file_types",
        "porn.nonstopvideos.pl \u2022 xxx-xvideo.com \u2022 essexmetals.com",
        "http://www.aerix.com/__media__/js/netsoltrademark.php?d=www.pornxxxgals.info/latex-porn/",
        "navy.mil \u2022 http://acts.navair.navy.mil \u2022  http://logistics.navair.navy.mil/rcm/",
        "https://www.cloud.mil/CVRC:/Users/joshua.colliflower/OneDrive/OneDrive%20-%20United%20States%20Department%20of%20the%20Navy/Documents/Archive%20Miscellaneous",
        "192.5.41.40 scanning_host\t\u2022 74.208.229.157 scanning_host",
        "444ea032708bb0d940de0ef72b944244 | credit msudosos",
        "Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244",
        "https://otx.alienvault.com/pulse/69b65d6a27024117a4cd3540 [credit msudosos]",
        "https://www.cybercom.mil/Portals/56/Documents/Strategy/DoD_Cyber_Strategy_2023.pdf",
        "DoD related:  192.5.41.40 scanning_host\t140.19.33.126 \u2022 199.9.2.136 \u2022 214.23.15.26",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6edod--a.gif",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6efyLw9|dod--a | (205.162.40.0/21) (Omeda Communications )",
        "205.162.42.171 (205.162.40.0/21) AS 53866 ( Omeda Communications )",
        "https://exchange.simply.ms/owa/auth/logon.aspx?url=https://exchange.simply.ms/owa/&reason=0",
        "mailbox.co.za",
        "fmx32.aig.com \u2022  167.230.105.81",
        "https://otx.alienvault.com/indicator/url/https://gossip.thedirty.com/cdn-cgi/l/chk_jschl?s=04e9c17f33a895764287ae3918f54f016b353177-1551745661-1800-AWU4eGCIAWcUFRuFo2RAigESClCdCQ/9FJquPKplzHISR2zmIZSTluV/jEDBqANqdDORIXIACOwCScDYumaSt5kRHUKVAK4z6Wlo0HzAhetn"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Patched3_c.AKRV",
          "display_name": "Patched3_c.AKRV",
          "target": null
        },
        {
          "id": "Win32:Agent-ALXE\\ [Rtk]",
          "display_name": "Win32:Agent-ALXE\\ [Rtk]",
          "target": null
        },
        {
          "id": "Win.Trojan.Rootkit-4668",
          "display_name": "Win.Trojan.Rootkit-4668",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre!rfn",
          "display_name": "Trojan:Win32/Tiggre!rfn",
          "target": "/malware/Trojan:Win32/Tiggre!rfn"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Inject2.BIVE",
          "display_name": "Inject2.BIVE",
          "target": null
        },
        {
          "id": "Crypt3.CHZW",
          "display_name": "Crypt3.CHZW",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BXMJ",
          "display_name": "Crypt3.BXMJ",
          "target": null
        },
        {
          "id": "Crypt3.BOQD\t\t Inject2.BHBW",
          "display_name": "Crypt3.BOQD\t\t Inject2.BHBW",
          "target": null
        },
        {
          "id": "Crypt3.BMVU",
          "display_name": "Crypt3.BMVU",
          "target": null
        },
        {
          "id": "Trojan.DownLoader12.43161",
          "display_name": "Trojan.DownLoader12.43161",
          "target": null
        },
        {
          "id": "HEUR/UnSec",
          "display_name": "HEUR/UnSec",
          "target": null
        },
        {
          "id": "ET Trojan",
          "display_name": "ET Trojan",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Umbald.A",
          "display_name": "TrojanDownloader:Win32/Umbald.A",
          "target": "/malware/TrojanDownloader:Win32/Umbald.A"
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1048.001",
          "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
          "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        }
      ],
      "industries": [
        "Government",
        "Military",
        "Defense",
        "Insurance"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 165,
        "FileHash-SHA1": 165,
        "FileHash-SHA256": 3524,
        "URL": 11424,
        "email": 1,
        "hostname": 3954,
        "domain": 2523
      },
      "indicator_count": 21756,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a1a73eb0578b92962dae97",
      "name": "FBI Link (Ransomware)sent to a device. opened on its own. Why?",
      "description": "I wouldn\u2019t typically search an alleged authentic government site , except it opened on a device, no prompt. TrojanDownloader:Win32/Dalexis!rfn!rfn\nIDS Detections\nMaktub Locker TOR Status Check\nTOR Consensus Data Requested\nTOR 1.0 Server Key Retrieval\nTor Get Server Request\nTLS Handshake Failure\nYara Detections\nstack_string\nWho is : [URL\n[https://tor-dirauth.sebastianhahn.net/]\n[https://tor.sebastianhahn.net]\n[tor-dirauth.sebastianhahn.net]\n->gitbot.faui2k9.de\n[Status faui2k9.de -connect] connects to device \n100% Malicious | https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70 |  [External resources discovered in HTML content:\ndap.digitalgov.gov | Pattern match: \"fbi.gov/contact-us/field-offices/denver/news/pr\"\nHeuristic match: \"x.com\" | will revisit",
      "modified": "2026-03-29T13:04:34.750000",
      "created": "2026-02-27T14:16:30.498000",
      "tags": [
        "regopenkeyexw",
        "port",
        "destination",
        "cryptexportkey",
        "search",
        "show",
        "entries",
        "windows nt",
        "regsetvalueexa",
        "ip address",
        "malware",
        "copy",
        "write",
        "win32",
        "next",
        "format",
        "contacted",
        "less ip",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "date",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "february",
        "failed",
        "enter",
        "data upload",
        "passive dns",
        "urls",
        "aaaa",
        "certificate",
        "otx logo",
        "all hostname",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "title",
        "body",
        "encrypt",
        "netherlands",
        "gmt content",
        "all ipv4",
        "amsterdam",
        "hetzner online",
        "gmbh",
        "summary",
        "url age",
        "de seen",
        "general info",
        "geo germany",
        "as as24940",
        "de note",
        "route",
        "direct",
        "pro platform",
        "logs",
        "suricata alert",
        "et info",
        "tls handshake",
        "bad traffic",
        "suricata alerts",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "size",
        "sha256",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "path",
        "unknown",
        "stop",
        "root",
        "hybrid",
        "general",
        "local",
        "form",
        "click",
        "strings",
        "9999",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "show technique",
        "ck matrix",
        "href",
        "antivirus",
        "maktub locker",
        "tor status",
        "check"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1129,
        "domain": 148,
        "hostname": 753,
        "FileHash-SHA256": 548,
        "FileHash-MD5": 90,
        "FileHash-SHA1": 71,
        "SSLCertFingerprint": 8,
        "CIDR": 1,
        "email": 4
      },
      "indicator_count": 2752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6961a8ed7b492f9e0ba38990",
      "name": "HeartSender.A and other Malware attacks originating from Palantirs Pahamify Pegasus",
      "description": "Pahamify Pegasus : HackTool \u2022 Speedcat \u2022 HeartSender.A \u2022 Zbot and other malware found.\nSearc begins with single FileHash referenced below. \nI\u2019m checking the processes and sharing it here one group at a time. Too much research at once could bring Amazon AWS down. Again.",
      "modified": "2026-02-09T00:04:37.974000",
      "created": "2026-01-10T01:18:36.999000",
      "tags": [
        "read c",
        "write c",
        "port",
        "destination",
        "united",
        "medium",
        "as16509",
        "memcommit",
        "write",
        "execution",
        "dock",
        "persistence",
        "next executed",
        "commands graph",
        "tree",
        "sample hash",
        "passive dns",
        "present jan",
        "title error",
        "urls",
        "files",
        "date hash",
        "avast avg",
        "dynamicloader",
        "host",
        "utf8",
        "unicode text",
        "crlf line",
        "binary resource",
        "ms windows",
        "search",
        "intel",
        "pcspeedcat",
        "win32",
        "internal",
        "malware",
        "local",
        "unknown",
        "get na",
        "http",
        "okrnserver",
        "ip address",
        "http traffic",
        "guard",
        "powershell",
        "ipv4 add",
        "servers",
        "name servers",
        "capture",
        "link",
        "gateway",
        "tofsee att",
        "ck ids",
        "t1055",
        "injection",
        "t1071",
        "protocol",
        "t1573",
        "target",
        "url http",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "t1480 execution",
        "discovery att",
        "mitre att",
        "ck matrix",
        "ascii text",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "high",
        "etpro malware",
        "next",
        "stack",
        "format",
        "error",
        "unicode",
        "head http",
        "regsetvalueexa",
        "qt binary",
        "resource file",
        "pe32",
        "hostile",
        "unknown aaaa",
        "unknown ns",
        "x content",
        "gmt cache",
        "domain add",
        "title",
        "present sep",
        "a td",
        "td tr",
        "dir td",
        "td td",
        "present may",
        "present jun",
        "present apr",
        "present aug",
        "present oct",
        "head body",
        "gmt server",
        "index",
        "main",
        "accept",
        "status",
        "th tr",
        "moved",
        "record value",
        "expiration date",
        "germany unknown",
        "present dec",
        "cache control",
        "present nov",
        "max age1000000",
        "cookie",
        "hosting",
        "reverse dns",
        "location france",
        "france asn",
        "as16276",
        "trojandropper",
        "next associated",
        "mtb jan",
        "exploit",
        "emails",
        "trojan",
        "pegasus",
        "hostname add",
        "url analysis",
        "domain",
        "files ip",
        "address",
        "france unknown",
        "asn as16276",
        "backdoor",
        "entries",
        "setcookie",
        "twitter",
        "refloadapihash",
        "virtool",
        "show",
        "displayname",
        "windows",
        "rndhex",
        "tofsee",
        "stream",
        "encrypt",
        "push",
        "creation date",
        "france",
        "date",
        "body",
        "pup",
        "amazon",
        "amazon aws",
        "salesforce",
        "herokuappdev",
        "google",
        "igoogle",
        "monitored target",
        "cats"
      ],
      "references": [
        "FileHash-SHA256\t9f66cab9d7c581cf2dd28b6ae3178bb3d38975ff257c3ffb67c3e89d0f7135ee",
        "https://otx.alienvault.com/indicator/ip/3.163.24.10",
        "External Hosts: 52.57.183.74\t access.pcspeedcat.com\taccess.pcspeedcat.com\tGermany\tAS16509 amazon.com inc\taccess.pcspeedcat.com Germany AS16509 amazon.",
        "External Hosts: 3.163.24.10\t www.pcspeedcat.com\twww.pcspeedcat.com\tUnited States ASNone",
        "https://otx.alienvault.com/indicator/hostname/pegasus.pahamify.com",
        "https://otx.alienvault.com/indicator/url/https://pegasus.pahamify.com/",
        "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "http://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "biblegateway.comwww.biblegateway.com \u2022 www.biblegateway.com",
        "Malicious Application Development: herokuappdev.com  (Patter match 8 years +)",
        "direwolf-8b1a1bc476.staging.herokuappdev.com",
        "Malicious Application Development: herokuappdev.com (pattern matching spans 8+ years)"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Generic-9871124-0",
          "display_name": "Win.Malware.Generic-9871124-0",
          "target": null
        },
        {
          "id": "ALF:HackTool:MSIL/HeartSender.A",
          "display_name": "ALF:HackTool:MSIL/HeartSender.A",
          "target": null
        },
        {
          "id": "Win.Malware.Speedcat-6957425",
          "display_name": "Win.Malware.Speedcat-6957425",
          "target": null
        },
        {
          "id": "Tofsee Attack",
          "display_name": "Tofsee Attack",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1192",
          "name": "Spearphishing Link",
          "display_name": "T1192 - Spearphishing Link"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 404,
        "FileHash-SHA1": 286,
        "FileHash-SHA256": 1419,
        "SSLCertFingerprint": 7,
        "domain": 441,
        "URL": 4233,
        "hostname": 1217,
        "email": 10
      },
      "indicator_count": 8017,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "69 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6946fdbb4a22dc28d60d6ca2",
      "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
      "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
      "modified": "2026-01-19T19:04:41.997000",
      "created": "2025-12-20T19:49:15.713000",
      "tags": [
        "doomscroller",
        "browsehappy",
        "xpirat",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "united",
        "tlsv1",
        "execution",
        "dock",
        "write",
        "persistence",
        "encrypt",
        "meta",
        "browse happy",
        "worry",
        "body doctype",
        "online",
        "gmt server",
        "a domains",
        "ipv4 add",
        "win32",
        "trojandropper",
        "title",
        "date",
        "unknown",
        "post http",
        "cryptexportkey",
        "cryptgenkey",
        "calgrc4",
        "expiro",
        "temple",
        "xserver",
        "adversaries",
        "worry wordpress"
      ],
      "references": [
        "Xpirat = doomscroller.io"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Xpirat",
          "display_name": "Xpirat",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1423",
          "name": "Network Service Scanning",
          "display_name": "T1423 - Network Service Scanning"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5576,
        "domain": 1502,
        "FileHash-MD5": 116,
        "FileHash-SHA1": 73,
        "FileHash-SHA256": 1041,
        "SSLCertFingerprint": 1,
        "hostname": 1951
      },
      "indicator_count": 10260,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "89 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68dd9423f9208dcc8701e12e",
      "name": "Maktub Locker TOR Status Check \u2022 Cab \\ Drive by( dbi.com) Malicious pic",
      "description": "After 911 told me I was bounced to the Denver, Co Station 5 , located 45 & Peoria in Denver , Colorado , not even close. \nThe phone number changed, only 911 access. Clue: I saw an Amber alert in n target phone when I powered it on. No all notices always turned off. Made a call\non contact list and screen changed to a plain faced interface. \n\nAfter finding a mother foundry link on targets phone I grew curious about a CEO\u2019s strange story of Palantir\u2019s Karp Theil roommate situation in Law School but I could only find one picture on of them on a campus in their late 40\u2019s. He\u2019s African American mixed. The picture of his mother in hacked phone is 215 yo. No information federal oversight as CEO right? Or limited information on crazy hacked device? \n\nClicked on link then OMGness\n\n#whatIfind #onhackeddevice #targeting",
      "modified": "2025-10-31T19:03:21.338000",
      "created": "2025-10-01T20:50:43.002000",
      "tags": [
        "iocs",
        "logo",
        "passive dns",
        "related tags",
        "none google",
        "ipv4",
        "gogle",
        "twitter",
        "x.com",
        "ransomware",
        "fbi \u2019site\u2019",
        "python",
        "cloud",
        "regopenkeyexw",
        "read c",
        "port",
        "destination",
        "cryptexportkey",
        "count read",
        "tor get",
        "malware",
        "write",
        "format",
        "redacted for",
        "server",
        "privacy tech",
        "privacy admin",
        "country",
        "postal code",
        "organization",
        "date",
        "email",
        "code",
        "aaaa",
        "value a",
        "key identifier",
        "v3 serial",
        "number",
        "cus ogoogle",
        "trust",
        "cnwe1 validity",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "maktub",
        "cnc",
        "python-projekt",
        "x post",
        "link",
        "android",
        "iphone",
        "google",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "ssl certificate",
        "spawns",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "mitre att",
        "show technique",
        "ck matrix",
        "title",
        "path",
        "hybrid",
        "general",
        "local",
        "form",
        "click",
        "strings",
        "body"
      ],
      "references": [
        "FBI.GOV - VT I\u2019m looking @ says website is legitimate & not misused - hmm",
        "Entity CLOUD14",
        "CLOUDFLARENET - 104.16.148.244 , 104.19.148.244",
        "https://otx.alienvault.com/indicator/file/ba30376f915afa868763f84299fae5d2",
        "https://hybrid-analysis.com/sample/f2b943e81f1b284cf9dabb4ff156526a02ecca485ac117714867d92b262c8fdd/68dd867e3bc50d9068072c05",
        "Hashtags left on Hybrid Analysis (above) weren\u2019t posted by me",
        "Maktub Locker TOR Status Check \u2022 TOR Consensus Data Requested \u2022 TOR 1.0 Server Key Retrieval",
        "Tor Get Server Request \u2022 TLS Handshake Failure High Priority",
        "Yara Detections: stack_string Alerts: dead_host",
        "Alerts: network_icmp nolookup_communication modifies_proxy_wpad network_cnc_http network_http",
        "Alerts: allocates_rwx creates_hidden_file dropper has_wmi protection_rx antivm_network_adapters",
        "Alerts: packer_entropy queries_programs wmi_antivm checks_debugger generates_crypto_key recon_fingerprint pe_unknown_resource_name raises_exception"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Code Virus Ransomware",
          "display_name": "Code Virus Ransomware",
          "target": null
        },
        {
          "id": "AVAST- Win32:Filecoder-AD\\ [Trj]",
          "display_name": "AVAST- Win32:Filecoder-AD\\ [Trj]",
          "target": null
        },
        {
          "id": "CLAMAV - Win.Malware.Cabby-6803812",
          "display_name": "CLAMAV - Win.Malware.Cabby-6803812",
          "target": null
        },
        {
          "id": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "display_name": "Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn",
          "target": "/malware/Ms Defender - TrojanDownloader:Win32/Dalexis!rfn!rfn"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 574,
        "domain": 147,
        "FileHash-MD5": 156,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 539,
        "URL": 982,
        "SSLCertFingerprint": 4,
        "email": 2
      },
      "indicator_count": 2534,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "169 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://bv.longshu.tk",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://bv.longshu.tk",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776618310.2835093
}