{
  "type": "URL",
  "indicator": "https://cdn.gvideo.io/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cdn.gvideo.io/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3758842287,
      "indicator": "https://cdn.gvideo.io/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "6570a91b1702fdce6c496a1e",
          "name": "note.html                                                                    [Pulse by OctoSeek]",
          "description": "",
          "modified": "2023-12-06T17:02:19.096000",
          "created": "2023-12-06T17:02:19.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a69b0f11713d9e4d0153",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:51:39.617000",
          "created": "2023-12-06T16:51:39.617000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a647bca43f24b4a05a97",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:50:15.239000",
          "created": "2023-12-06T16:50:15.239000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6510efe0ef29f9f05b4a7dbc",
          "name": "note.html",
          "description": "Malicious",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-09-25T02:26:40.583000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "651349097e0dee296da611fc",
          "name": "note.html",
          "description": "",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-09-26T21:11:37.530000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6510efe0ef29f9f05b4a7dbc",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a97aa526adfee6ea546d1",
          "name": "note.html                                                                    [Pulse by OctoSeek]",
          "description": "",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-10-14T13:29:14.460000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6510efe0ef29f9f05b4a7dbc",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Analysis",
        "Other online research",
        "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
        "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
        "Web Tools"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Threatfox",
            "Dropper.dapato",
            "Heur:trojan.bat",
            "Trojan.js.obfjs",
            "Vdehu.a"
          ],
          "industries": [],
          "unique_indicators": 5672
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/gvideo.io",
    "whois": "http://whois.domaintools.com/gvideo.io",
    "domain": "gvideo.io",
    "hostname": "cdn.gvideo.io"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "6570a91b1702fdce6c496a1e",
      "name": "note.html                                                                    [Pulse by OctoSeek]",
      "description": "",
      "modified": "2023-12-06T17:02:19.096000",
      "created": "2023-12-06T17:02:19.096000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "CVE": 2,
        "FileHash-SHA256": 1422,
        "domain": 481,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a69b0f11713d9e4d0153",
      "name": "note.html",
      "description": "",
      "modified": "2023-12-06T16:51:39.617000",
      "created": "2023-12-06T16:51:39.617000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "CVE": 2,
        "FileHash-SHA256": 1422,
        "domain": 481,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a647bca43f24b4a05a97",
      "name": "note.html",
      "description": "",
      "modified": "2023-12-06T16:50:15.239000",
      "created": "2023-12-06T16:50:15.239000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "CVE": 2,
        "FileHash-SHA256": 1422,
        "domain": 481,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6510efe0ef29f9f05b4a7dbc",
      "name": "note.html",
      "description": "Malicious",
      "modified": "2023-10-24T17:02:05.352000",
      "created": "2023-09-25T02:26:40.583000",
      "tags": [
        "ssl certificate",
        "whois record",
        "resolutions",
        "communicating",
        "referrer",
        "apple",
        "historical ssl",
        "subdomains",
        "contacted",
        "hacktool",
        "united",
        "et info",
        "flag",
        "bad traffic",
        "date",
        "tls handshake",
        "failure",
        "misc activity",
        "external ip",
        "server",
        "blacklist",
        "unknown malware",
        "threatfox",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid hypertext",
        "markup language",
        "file size",
        "submission",
        "analysis",
        "rules not",
        "not found",
        "mitre",
        "info ids",
        "found sigma",
        "found",
        "files not",
        "found network",
        "ja3 mitre",
        "ta0007 command",
        "Pattern match: \"bootstrap@4.4.1\"",
        "Pattern match: \"popper.js@1.16.0\"",
        "100.0% (.HTML) HyperText Markup Language",
        "Attempts to identify its external IP address",
        "0x2b3861",
        "0x1f264c",
        "0x1e9f6a",
        "0x45b62b",
        "0xac498a",
        "0x574ac1",
        "0x4919e6window",
        "uint8array",
        "0x4919e6",
        "html file",
        "url https",
        "file name",
        "tag summary",
        "mitre1 iocs8",
        "images embedded",
        "codes comments0",
        "category value",
        "url http",
        "toolbar",
        "evasive"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
        "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
        "Web Tools",
        "Other online research",
        "Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ThreatFox",
          "display_name": "ThreatFox",
          "target": null
        },
        {
          "id": "HEUR:Trojan.BAT",
          "display_name": "HEUR:Trojan.BAT",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Trojan.JS.ObfJS",
          "display_name": "Trojan.JS.ObfJS",
          "target": null
        },
        {
          "id": "Dropper.Dapato",
          "display_name": "Dropper.Dapato",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1422,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29,
        "domain": 481,
        "hostname": 909,
        "CVE": 2
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "907 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "651349097e0dee296da611fc",
      "name": "note.html",
      "description": "",
      "modified": "2023-10-24T17:02:05.352000",
      "created": "2023-09-26T21:11:37.530000",
      "tags": [
        "ssl certificate",
        "whois record",
        "resolutions",
        "communicating",
        "referrer",
        "apple",
        "historical ssl",
        "subdomains",
        "contacted",
        "hacktool",
        "united",
        "et info",
        "flag",
        "bad traffic",
        "date",
        "tls handshake",
        "failure",
        "misc activity",
        "external ip",
        "server",
        "blacklist",
        "unknown malware",
        "threatfox",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid hypertext",
        "markup language",
        "file size",
        "submission",
        "analysis",
        "rules not",
        "not found",
        "mitre",
        "info ids",
        "found sigma",
        "found",
        "files not",
        "found network",
        "ja3 mitre",
        "ta0007 command",
        "Pattern match: \"bootstrap@4.4.1\"",
        "Pattern match: \"popper.js@1.16.0\"",
        "100.0% (.HTML) HyperText Markup Language",
        "Attempts to identify its external IP address",
        "0x2b3861",
        "0x1f264c",
        "0x1e9f6a",
        "0x45b62b",
        "0xac498a",
        "0x574ac1",
        "0x4919e6window",
        "uint8array",
        "0x4919e6",
        "html file",
        "url https",
        "file name",
        "tag summary",
        "mitre1 iocs8",
        "images embedded",
        "codes comments0",
        "category value",
        "url http",
        "toolbar",
        "evasive"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
        "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
        "Web Tools",
        "Other online research",
        "Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ThreatFox",
          "display_name": "ThreatFox",
          "target": null
        },
        {
          "id": "HEUR:Trojan.BAT",
          "display_name": "HEUR:Trojan.BAT",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Trojan.JS.ObfJS",
          "display_name": "Trojan.JS.ObfJS",
          "target": null
        },
        {
          "id": "Dropper.Dapato",
          "display_name": "Dropper.Dapato",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6510efe0ef29f9f05b4a7dbc",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1422,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29,
        "domain": 481,
        "hostname": 909,
        "CVE": 2
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "907 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "652a97aa526adfee6ea546d1",
      "name": "note.html                                                                    [Pulse by OctoSeek]",
      "description": "",
      "modified": "2023-10-24T17:02:05.352000",
      "created": "2023-10-14T13:29:14.460000",
      "tags": [
        "ssl certificate",
        "whois record",
        "resolutions",
        "communicating",
        "referrer",
        "apple",
        "historical ssl",
        "subdomains",
        "contacted",
        "hacktool",
        "united",
        "et info",
        "flag",
        "bad traffic",
        "date",
        "tls handshake",
        "failure",
        "misc activity",
        "external ip",
        "server",
        "blacklist",
        "unknown malware",
        "threatfox",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid hypertext",
        "markup language",
        "file size",
        "submission",
        "analysis",
        "rules not",
        "not found",
        "mitre",
        "info ids",
        "found sigma",
        "found",
        "files not",
        "found network",
        "ja3 mitre",
        "ta0007 command",
        "Pattern match: \"bootstrap@4.4.1\"",
        "Pattern match: \"popper.js@1.16.0\"",
        "100.0% (.HTML) HyperText Markup Language",
        "Attempts to identify its external IP address",
        "0x2b3861",
        "0x1f264c",
        "0x1e9f6a",
        "0x45b62b",
        "0xac498a",
        "0x574ac1",
        "0x4919e6window",
        "uint8array",
        "0x4919e6",
        "html file",
        "url https",
        "file name",
        "tag summary",
        "mitre1 iocs8",
        "images embedded",
        "codes comments0",
        "category value",
        "url http",
        "toolbar",
        "evasive"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
        "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
        "Web Tools",
        "Other online research",
        "Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ThreatFox",
          "display_name": "ThreatFox",
          "target": null
        },
        {
          "id": "HEUR:Trojan.BAT",
          "display_name": "HEUR:Trojan.BAT",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Trojan.JS.ObfJS",
          "display_name": "Trojan.JS.ObfJS",
          "target": null
        },
        {
          "id": "Dropper.Dapato",
          "display_name": "Dropper.Dapato",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6510efe0ef29f9f05b4a7dbc",
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1422,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29,
        "domain": 481,
        "hostname": 909,
        "CVE": 2
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "907 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cdn.gvideo.io/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cdn.gvideo.io/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776617414.366089
}