{
  "type": "URL",
  "indicator": "https://cdnforplugins.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cdnforplugins.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2903241192,
      "indicator": "https://cdnforplugins.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 16,
      "pulses": [
        {
          "id": "68ae5b9ef87646927a236b61",
          "name": "Privacy - Google Videos Search - Web Applications Stack Exchange = WannaCry",
          "description": "Description: dfir.blog - A blog about Digital Forensics & Incident Response\ndfir.blog\nDigital forensics, web browsers, visualizations, & open source tools.\n#monitoring #dod(?) #chinacache #crypt #ransom#infectedsystems",
          "modified": "2025-09-26T00:01:12.214000",
          "created": "2025-08-27T01:13:02.780000",
          "tags": [
            "google",
            "mullvad browser",
            "value",
            "incognito mode",
            "mine",
            "unix time",
            "friday",
            "january",
            "does",
            "tor browser",
            "search",
            "show",
            "langchinese",
            "packing t1045",
            "t1045",
            "medium",
            "pe resource",
            "module load",
            "t1129",
            "service",
            "trojan",
            "copy",
            "dock",
            "write",
            "malware",
            "clock",
            "united",
            "passive dns",
            "urls",
            "next associated",
            "gmt cache",
            "ipv4 add",
            "pulse pulses",
            "files",
            "reverse dns",
            "win32",
            "title",
            "location united",
            "america flag",
            "america asn",
            "as15169 google",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "present aug",
            "china unknown",
            "creation date",
            "date",
            "domain",
            "ip address",
            "domain name",
            "expiration date",
            "status ok",
            "nanjing",
            "accept",
            "body",
            "div td",
            "td tr",
            "div div",
            "span span",
            "a li",
            "span p",
            "p div",
            "moved",
            "a domains",
            "open",
            "span",
            "uuupupu",
            "t1055",
            "process32nextw",
            "high",
            "windows",
            "high defense",
            "evasion",
            "delphi",
            "google gmail",
            "images sign",
            "advanced search",
            "solutions",
            "privacy",
            "store gmail",
            "delete delete",
            "report",
            "how search",
            "applying ai",
            "settings search",
            "advanced",
            "search search",
            "search help",
            "domainabuse",
            "showing",
            "hostname add",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "read c",
            "tlsv1",
            "whitelisted",
            "port",
            "destination",
            "ascii text",
            "next",
            "encrypt",
            "script urls",
            "msie",
            "chrome",
            "bad gateway",
            "script domains",
            "present feb",
            "link",
            "meta",
            "digital",
            "language",
            "body doctype",
            "ghost",
            "present jun",
            "aaaa",
            "present jul",
            "present oct",
            "record value",
            "yara detections",
            "dock zone",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "code",
            "error",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "execution",
            "persistence",
            "tulach",
            "brian sabey",
            "dod network",
            "orgtechref",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "entity dnic",
            "handle",
            "whois lookup",
            "dod",
            "et trojan",
            "server header",
            "suspicious",
            "et info",
            "unknown",
            "virustotal",
            "specified",
            "download",
            "et",
            "please",
            "type size",
            "first seen",
            "loading",
            "python wheel",
            "dynamicloader",
            "intel",
            "ms windows",
            "pe32",
            "entries",
            "user agent",
            "powershell",
            "agent",
            "yara rule",
            "checks",
            "levelblue",
            "open threat",
            "observed dns",
            "query",
            "dns lookup",
            "msdos",
            "wannacry dns",
            "lookup",
            "wannacry",
            "worm",
            "explorer",
            "msil",
            "darkcomet",
            "ping",
            "tools",
            "capture",
            "hallrender",
            "dga domains",
            "unfurl sites",
            "honey net",
            "bot",
            "nxdomain",
            "potential-c2"
          ],
          "references": [
            "Don\u2019t click! https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | Infected systems",
            "DoD Network Information Center (DNIC)",
            "DoD Network Information Center disa.columbus.ns.mbx.arin-registrations@mail.mil [seen throughout}",
            "Python Wheel package",
            "https://www.google.com/search",
            "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com",
            "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Magania.DSK!MTB",
              "display_name": "Trojan:Win32/Magania.DSK!MTB",
              "target": "/malware/Trojan:Win32/Magania.DSK!MTB"
            },
            {
              "id": "Trojan:Win32/Zusy",
              "display_name": "Trojan:Win32/Zusy",
              "target": "/malware/Trojan:Win32/Zusy"
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "a variant of Win32/Kryptik.DEOA",
              "display_name": "a variant of Win32/Kryptik.DEOA",
              "target": null
            },
            {
              "id": "ALF:Exploit:Win32/gSharedInfoRef.A",
              "display_name": "ALF:Exploit:Win32/gSharedInfoRef.A",
              "target": null
            },
            {
              "id": "Wannacry",
              "display_name": "Wannacry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1054",
              "name": "Indicator Blocking",
              "display_name": "T1054 - Indicator Blocking"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [
            "Telecommunications",
            "Technology",
            "Civilian"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8221,
            "domain": 1216,
            "FileHash-SHA256": 2434,
            "FileHash-MD5": 296,
            "FileHash-SHA1": 155,
            "hostname": 2939,
            "email": 7,
            "SSLCertFingerprint": 8,
            "CIDR": 2
          },
          "indicator_count": 15278,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "205 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aafd0e93efa420f74123c",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2024-10-12T01:00:47.836000",
          "created": "2023-12-02T04:17:20.189000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6562908e28e6cdc237fbf8db",
          "export_count": 107,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3895,
            "URL": 11195,
            "domain": 2959,
            "hostname": 3575,
            "CVE": 16,
            "SSLCertFingerprint": 1,
            "email": 1
          },
          "indicator_count": 24465,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "554 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea56ae1992b02a25aa5c51",
          "name": "TrojanSpy:Win32/Nivdort | Affected OTX accounts | Yotta  Network",
          "description": "Part II -Some users OTX accounts connected to the following | Unexpected revelation | A group of hackers masquerading as attorneys, government officials, advocates, fake nsa, security professional, help desk, etc. I don't know the association with otx.alienvault. Unauthorized logins OTX users. accounts. Deleted and modified pulses, etc. Needs further research for me to fully understand.",
          "modified": "2024-04-06T23:03:19.046000",
          "created": "2024-03-08T00:07:10.521000",
          "tags": [
            "methodpost",
            "threat",
            "iocs",
            "urls http",
            "samples",
            "cnc",
            "phishing",
            "ransom",
            "emotet",
            "fraud services",
            "command _and_control",
            "trojan",
            "scanning host",
            "active threat",
            "malicious",
            "date hash",
            "avast avg",
            "susp",
            "win32",
            "paste",
            "hostnames",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "headers date",
            "connection",
            "first",
            "utc submissions",
            "submitters",
            "computer",
            "company limited",
            "gandi sas",
            "ovh sas",
            "export",
            "summary iocs",
            "graph community",
            "limited",
            "yotta network",
            "gvb gelimed",
            "kb microsoft",
            "indonesia",
            "kyriazhs1975",
            "vj79",
            "bc https",
            "rexxfield",
            "brian sabey",
            "as21342",
            "united",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "msie",
            "chrome",
            "creation date",
            "search",
            "dnssec",
            "entries",
            "body",
            "date",
            "as63949 linode",
            "mtb feb",
            "checkin m1",
            "gmt content",
            "type",
            "encrypt",
            "trojan",
            "artro",
            "moved",
            "pulse pulses",
            "yotta data",
            "yotta",
            "private limited",
            "india",
            "limited yotta",
            "number",
            "as140641",
            "network",
            "facebook",
            "info",
            "cisco umbrella",
            "site",
            "alexa top",
            "site top",
            "million",
            "safe site",
            "million alexa",
            "site safe",
            "cobalt strike",
            "malicious url",
            "blacknet rat",
            "union",
            "vidar",
            "malware",
            "stealer",
            "bank",
            "alexa",
            "deepscan",
            "phishing",
            "team",
            "super",
            "blacknet",
            "babar",
            "detection list",
            "blacklist http",
            "sample",
            "submission",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "kb body",
            "path",
            "as396982 google",
            "bq mar",
            "win32cve mar",
            "exploit",
            "virtool",
            "status",
            "name servers",
            "emails",
            "servers",
            "next",
            "files",
            "as44273 host",
            "germany unknown",
            "expiration date",
            "showing",
            "win32upatre mar",
            "milehighmedia",
            "ids detections",
            "possible fake",
            "av checkin",
            "initial checkin",
            "checkin",
            "utah data",
            "center",
            "june",
            "data center",
            "responsible",
            "nsa utah",
            "march",
            "closeup view",
            "july",
            "view",
            "february",
            "prism",
            "cascade",
            "darpa",
            "twitter",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "nxdomain",
            "whitelisted",
            "domain",
            "as54113",
            "msil",
            "cryp",
            "files show",
            "entries related",
            "domains",
            "as15169 google",
            "gmt cache",
            "sameorigin",
            "trojandropper",
            "asnone united",
            "title error",
            "porkbun",
            "mtb mar",
            "trojanspy",
            "installer",
            "loader",
            "hijacker",
            "targeting",
            "as30456",
            "sec ch",
            "for privacy",
            "ch ua",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "lowfi",
            "dns replication",
            "ip detections",
            "country",
            "contacted",
            "graph",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid file",
            "file size",
            "open threat",
            "learn",
            "html info",
            "exchange meta",
            "tags twitter",
            "alienvault",
            "script tags",
            "iframe tags",
            "google tag",
            "manager anchor",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "google",
            "amazon ec2",
            "email",
            "city",
            "server",
            "amazon data",
            "amazon",
            "code",
            "form",
            "po box",
            "tech",
            "show",
            "description ype",
            "collections",
            "partru",
            "execution",
            "fake host"
          ],
          "references": [
            "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
            "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
            "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
            "https://www.milehighmedia.com/legal/2257",
            "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
            "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
            "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
            "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
            "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
            "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
            "https://nsa.gov1.info/utah-data-center",
            "https://softwaremill.com/grpc-vs-rest/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Arab Emirates"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "target": null
            },
            {
              "id": "Crypt3.BWVY",
              "display_name": "Crypt3.BWVY",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "Dropper.Generic_r.EC",
              "display_name": "Dropper.Generic_r.EC",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Zbot",
              "display_name": "ALF:Trojan:Win32/Zbot",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1605",
              "name": "Command-Line Interface",
              "display_name": "T1605 - Command-Line Interface"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology",
            "Financial"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6765,
            "FileHash-MD5": 688,
            "FileHash-SHA1": 422,
            "FileHash-SHA256": 3169,
            "domain": 2171,
            "hostname": 1714,
            "email": 11,
            "CVE": 2,
            "CIDR": 2
          },
          "indicator_count": 14944,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "742 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eadaae65b9123721198d08",
          "name": "Nivdort | Affected OTX accounts | Yotta Network (Cloned OTX user)",
          "description": "",
          "modified": "2024-04-06T23:03:19.046000",
          "created": "2024-03-08T09:30:22.295000",
          "tags": [
            "methodpost",
            "threat",
            "iocs",
            "urls http",
            "samples",
            "cnc",
            "phishing",
            "ransom",
            "emotet",
            "fraud services",
            "command _and_control",
            "trojan",
            "scanning host",
            "active threat",
            "malicious",
            "date hash",
            "avast avg",
            "susp",
            "win32",
            "paste",
            "hostnames",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "headers date",
            "connection",
            "first",
            "utc submissions",
            "submitters",
            "computer",
            "company limited",
            "gandi sas",
            "ovh sas",
            "export",
            "summary iocs",
            "graph community",
            "limited",
            "yotta network",
            "gvb gelimed",
            "kb microsoft",
            "indonesia",
            "kyriazhs1975",
            "vj79",
            "bc https",
            "rexxfield",
            "brian sabey",
            "as21342",
            "united",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "msie",
            "chrome",
            "creation date",
            "search",
            "dnssec",
            "entries",
            "body",
            "date",
            "as63949 linode",
            "mtb feb",
            "checkin m1",
            "gmt content",
            "type",
            "encrypt",
            "trojan",
            "artro",
            "moved",
            "pulse pulses",
            "yotta data",
            "yotta",
            "private limited",
            "india",
            "limited yotta",
            "number",
            "as140641",
            "network",
            "facebook",
            "info",
            "cisco umbrella",
            "site",
            "alexa top",
            "site top",
            "million",
            "safe site",
            "million alexa",
            "site safe",
            "cobalt strike",
            "malicious url",
            "blacknet rat",
            "union",
            "vidar",
            "malware",
            "stealer",
            "bank",
            "alexa",
            "deepscan",
            "phishing",
            "team",
            "super",
            "blacknet",
            "babar",
            "detection list",
            "blacklist http",
            "sample",
            "submission",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "kb body",
            "path",
            "as396982 google",
            "bq mar",
            "win32cve mar",
            "exploit",
            "virtool",
            "status",
            "name servers",
            "emails",
            "servers",
            "next",
            "files",
            "as44273 host",
            "germany unknown",
            "expiration date",
            "showing",
            "win32upatre mar",
            "milehighmedia",
            "ids detections",
            "possible fake",
            "av checkin",
            "initial checkin",
            "checkin",
            "utah data",
            "center",
            "june",
            "data center",
            "responsible",
            "nsa utah",
            "march",
            "closeup view",
            "july",
            "view",
            "february",
            "prism",
            "cascade",
            "darpa",
            "twitter",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "nxdomain",
            "whitelisted",
            "domain",
            "as54113",
            "msil",
            "cryp",
            "files show",
            "entries related",
            "domains",
            "as15169 google",
            "gmt cache",
            "sameorigin",
            "trojandropper",
            "asnone united",
            "title error",
            "porkbun",
            "mtb mar",
            "trojanspy",
            "installer",
            "loader",
            "hijacker",
            "targeting",
            "as30456",
            "sec ch",
            "for privacy",
            "ch ua",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "lowfi",
            "dns replication",
            "ip detections",
            "country",
            "contacted",
            "graph",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid file",
            "file size",
            "open threat",
            "learn",
            "html info",
            "exchange meta",
            "tags twitter",
            "alienvault",
            "script tags",
            "iframe tags",
            "google tag",
            "manager anchor",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "google",
            "amazon ec2",
            "email",
            "city",
            "server",
            "amazon data",
            "amazon",
            "code",
            "form",
            "po box",
            "tech",
            "show",
            "description ype",
            "collections",
            "partru",
            "execution",
            "fake host"
          ],
          "references": [
            "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
            "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
            "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
            "https://www.milehighmedia.com/legal/2257",
            "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
            "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
            "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
            "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
            "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
            "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
            "https://nsa.gov1.info/utah-data-center",
            "https://softwaremill.com/grpc-vs-rest/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Arab Emirates"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "target": null
            },
            {
              "id": "Crypt3.BWVY",
              "display_name": "Crypt3.BWVY",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "Dropper.Generic_r.EC",
              "display_name": "Dropper.Generic_r.EC",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Zbot",
              "display_name": "ALF:Trojan:Win32/Zbot",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1605",
              "name": "Command-Line Interface",
              "display_name": "T1605 - Command-Line Interface"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology",
            "Financial"
          ],
          "TLP": "white",
          "cloned_from": "65ea56ae1992b02a25aa5c51",
          "export_count": 63,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6765,
            "FileHash-MD5": 688,
            "FileHash-SHA1": 422,
            "FileHash-SHA256": 3169,
            "domain": 2171,
            "hostname": 1714,
            "email": 11,
            "CVE": 2,
            "CIDR": 2
          },
          "indicator_count": 14944,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "742 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c994c8b145925072b6583a",
          "name": "Private Loader cyber threat - Sliq.net | https://house.mo.gov",
          "description": "Link found active  in https://house.mo.gov. \nhttps://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1 |",
          "modified": "2024-03-13T03:00:40.889000",
          "created": "2024-02-12T03:47:20.138000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "referrer",
            "historical ssl",
            "remcos rat",
            "august",
            "iocs",
            "contacted",
            "qakbot",
            "june",
            "service",
            "privateloader",
            "amadey",
            "blacknet rat",
            "qbot",
            "cobalt strike",
            "push",
            "core",
            "malformed domains",
            "sliq",
            "typosquatting",
            "malware",
            "network",
            "dns",
            "spyware",
            "access",
            "remote",
            "cyber threat",
            "virus network",
            "command and control",
            "remote connections",
            "exploits",
            "injection",
            "legislature",
            "trojan",
            "scanning host",
            "threat analyzer",
            "threat",
            "paste",
            "urls https",
            "locationchamber",
            "viewmode3",
            "hostnames",
            "url https",
            "false layer",
            "http"
          ],
          "references": [
            "https://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1",
            "https://www.facebooksunglassshop.com [pegasus related]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "PrivateLoader",
              "display_name": "PrivateLoader",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1608.002",
              "name": "Upload Tool",
              "display_name": "T1608.002 - Upload Tool"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [
            "Government",
            "Technology",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 56,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 1384,
            "CVE": 5,
            "URL": 1865,
            "domain": 222,
            "hostname": 648
          },
          "indicator_count": 4216,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "767 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab679e6ff8544ecf11962",
          "name": "Private Loader cyber threat - Sliq.net | https://house.mo.gov ",
          "description": "",
          "modified": "2024-03-13T03:00:40.889000",
          "created": "2024-02-13T00:23:21.062000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "referrer",
            "historical ssl",
            "remcos rat",
            "august",
            "iocs",
            "contacted",
            "qakbot",
            "june",
            "service",
            "privateloader",
            "amadey",
            "blacknet rat",
            "qbot",
            "cobalt strike",
            "push",
            "core",
            "malformed domains",
            "sliq",
            "typosquatting",
            "malware",
            "network",
            "dns",
            "spyware",
            "access",
            "remote",
            "cyber threat",
            "virus network",
            "command and control",
            "remote connections",
            "exploits",
            "injection",
            "legislature",
            "trojan",
            "scanning host",
            "threat analyzer",
            "threat",
            "paste",
            "urls https",
            "locationchamber",
            "viewmode3",
            "hostnames",
            "url https",
            "false layer",
            "http"
          ],
          "references": [
            "https://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1",
            "https://www.facebooksunglassshop.com [pegasus related]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "PrivateLoader",
              "display_name": "PrivateLoader",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1608.002",
              "name": "Upload Tool",
              "display_name": "T1608.002 - Upload Tool"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [
            "Government",
            "Technology",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": "65c994c8b145925072b6583a",
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 56,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 1384,
            "CVE": 5,
            "URL": 1865,
            "domain": 222,
            "hostname": 648
          },
          "indicator_count": 4216,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "767 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6562908e28e6cdc237fbf8db",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2023-12-26T00:03:03.925000",
          "created": "2023-11-26T00:25:50.529000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3751,
            "URL": 10878,
            "domain": 2914,
            "hostname": 3520,
            "CVE": 16
          },
          "indicator_count": 23902,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aafce24b001cba328dcbc",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2023-12-26T00:03:03.925000",
          "created": "2023-12-02T04:17:18.188000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6562908e28e6cdc237fbf8db",
          "export_count": 78,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3751,
            "URL": 10878,
            "domain": 2914,
            "hostname": 3520,
            "CVE": 16
          },
          "indicator_count": 23902,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a91b1702fdce6c496a1e",
          "name": "note.html                                                                    [Pulse by OctoSeek]",
          "description": "",
          "modified": "2023-12-06T17:02:19.096000",
          "created": "2023-12-06T17:02:19.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a69b0f11713d9e4d0153",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:51:39.617000",
          "created": "2023-12-06T16:51:39.617000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a647bca43f24b4a05a97",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:50:15.239000",
          "created": "2023-12-06T16:50:15.239000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6533ed2685e0fc66ac0628bd",
          "name": "Network capture | Gather Victim Network Information | C2",
          "description": "Botnet. Spammer. BN campaigners. Victim name used for marketing BN and porn. This website contains age-restricted material and contains explicit depictions of sexual activity, but does not ask for permission to access or access any of the site's materials. \u00c2\u00a9 Mile High Distribution Inc",
          "modified": "2023-11-20T11:03:09.867000",
          "created": "2023-10-21T15:24:22.377000",
          "tags": [
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "ssl certificate",
            "contacted",
            "whois record",
            "tsara brashears",
            "historical ssl",
            "apple",
            "password",
            "porn",
            "networks",
            "botnet campaign",
            "crypto",
            "installer",
            "attacker",
            "metro",
            "brazzers",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "maxage86400",
            "path",
            "html info",
            "title page",
            "found meta",
            "milehigh",
            "watch",
            "milfs",
            "trackers google",
            "analytics na",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "specific",
            "pattern match",
            "file",
            "ascii text",
            "windows nt",
            "jpeg image",
            "united",
            "appdata",
            "jfif",
            "mitre att",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "general",
            "local",
            "strings",
            "class",
            "critical",
            "error",
            "server",
            "email",
            "code",
            "whois privacy",
            "domain status",
            "registrar abuse",
            "registrar url",
            "registrar",
            "registry domain",
            "C2",
            "organization",
            "threat level",
            "windir",
            "getpost",
            "name server",
            "openurl c"
          ],
          "references": [
            "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
            "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
            "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]",
            "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
            "m1.sweetheartvideo.com                                                                            [mailer!]",
            "mba3.sweetheartvideo.com                                                                       [Server]",
            "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
            "Other",
            "browser.events.data.msn.com                                                                    [sandbox and archive browser events]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4377,
            "FileHash-MD5": 128,
            "FileHash-SHA1": 127,
            "FileHash-SHA256": 2861,
            "domain": 829,
            "hostname": 1452,
            "CVE": 1,
            "email": 6
          },
          "indicator_count": 9781,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "881 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1d4a989642696d13b34c",
          "name": "Network capture | Gather Victim Network Information | C2",
          "description": "",
          "modified": "2023-11-20T11:03:09.867000",
          "created": "2023-10-30T03:04:42.175000",
          "tags": [
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "ssl certificate",
            "contacted",
            "whois record",
            "tsara brashears",
            "historical ssl",
            "apple",
            "password",
            "porn",
            "networks",
            "botnet campaign",
            "crypto",
            "installer",
            "attacker",
            "metro",
            "brazzers",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "maxage86400",
            "path",
            "html info",
            "title page",
            "found meta",
            "milehigh",
            "watch",
            "milfs",
            "trackers google",
            "analytics na",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "specific",
            "pattern match",
            "file",
            "ascii text",
            "windows nt",
            "jpeg image",
            "united",
            "appdata",
            "jfif",
            "mitre att",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "general",
            "local",
            "strings",
            "class",
            "critical",
            "error",
            "server",
            "email",
            "code",
            "whois privacy",
            "domain status",
            "registrar abuse",
            "registrar url",
            "registrar",
            "registry domain",
            "C2",
            "organization",
            "threat level",
            "windir",
            "getpost",
            "name server",
            "openurl c"
          ],
          "references": [
            "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
            "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
            "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]",
            "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
            "m1.sweetheartvideo.com                                                                            [mailer!]",
            "mba3.sweetheartvideo.com                                                                       [Server]",
            "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
            "Other",
            "browser.events.data.msn.com                                                                    [sandbox and archive browser events]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6533ed2685e0fc66ac0628bd",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4377,
            "FileHash-MD5": 128,
            "FileHash-SHA1": 127,
            "FileHash-SHA256": 2861,
            "domain": 829,
            "hostname": 1452,
            "CVE": 1,
            "email": 6
          },
          "indicator_count": 9781,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "881 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6510efe0ef29f9f05b4a7dbc",
          "name": "note.html",
          "description": "Malicious",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-09-25T02:26:40.583000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "908 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "651349097e0dee296da611fc",
          "name": "note.html",
          "description": "",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-09-26T21:11:37.530000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6510efe0ef29f9f05b4a7dbc",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "908 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652a97aa526adfee6ea546d1",
          "name": "note.html                                                                    [Pulse by OctoSeek]",
          "description": "",
          "modified": "2023-10-24T17:02:05.352000",
          "created": "2023-10-14T13:29:14.460000",
          "tags": [
            "ssl certificate",
            "whois record",
            "resolutions",
            "communicating",
            "referrer",
            "apple",
            "historical ssl",
            "subdomains",
            "contacted",
            "hacktool",
            "united",
            "et info",
            "flag",
            "bad traffic",
            "date",
            "tls handshake",
            "failure",
            "misc activity",
            "external ip",
            "server",
            "blacklist",
            "unknown malware",
            "threatfox",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid hypertext",
            "markup language",
            "file size",
            "submission",
            "analysis",
            "rules not",
            "not found",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "ja3 mitre",
            "ta0007 command",
            "Pattern match: \"bootstrap@4.4.1\"",
            "Pattern match: \"popper.js@1.16.0\"",
            "100.0% (.HTML) HyperText Markup Language",
            "Attempts to identify its external IP address",
            "0x2b3861",
            "0x1f264c",
            "0x1e9f6a",
            "0x45b62b",
            "0xac498a",
            "0x574ac1",
            "0x4919e6window",
            "uint8array",
            "0x4919e6",
            "html file",
            "url https",
            "file name",
            "tag summary",
            "mitre1 iocs8",
            "images embedded",
            "codes comments0",
            "category value",
            "url http",
            "toolbar",
            "evasive"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
            "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
            "Web Tools",
            "Other online research",
            "Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ThreatFox",
              "display_name": "ThreatFox",
              "target": null
            },
            {
              "id": "HEUR:Trojan.BAT",
              "display_name": "HEUR:Trojan.BAT",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Trojan.JS.ObfJS",
              "display_name": "Trojan.JS.ObfJS",
              "target": null
            },
            {
              "id": "Dropper.Dapato",
              "display_name": "Dropper.Dapato",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6510efe0ef29f9f05b4a7dbc",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1422,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "domain": 481,
            "hostname": 909,
            "CVE": 2
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "908 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "https://www.google.com/search",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "Don\u2019t click! https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | Infected systems",
        "apex.jquery.com             (scammer | works for who?)",
        "mba3.sweetheartvideo.com                                                                       [Server]",
        "Python Wheel package",
        "photos.theleders.family",
        "Other online research",
        "https://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "DoD Network Information Center (DNIC)",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "m1.sweetheartvideo.com                                                                            [mailer!]",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "142.250.180.4 (init.ess)",
        "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "apple-dns.net",
        "https://urlscan.io/domain/maxwam.tk",
        "Analysis",
        "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
        "Other",
        "http://tracks.theleders.family",
        "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "browser.events.data.msn.com                                                                    [sandbox and archive browser events]",
        "SHA256  92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1",
        "https://www.milehighmedia.com/legal/2257",
        "nr-data.net",
        "freeimdatingsites.thomasdobo.eu",
        "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
        "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "https://softwaremill.com/grpc-vs-rest/",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "103.233.208.9                    (CNC IP)",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "https://www.facebooksunglassshop.com [pegasus related]",
        "http://mobtrack.trkclk.net",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "emails.redvue.com  (apple DNS w/amvima)",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "api.useragentswitch.com",
        "Web Tools",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "DoD Network Information Center disa.columbus.ns.mbx.arin-registrations@mail.mil [seen throughout}",
        "dns.google                          (DNS client services - Doug Cole)",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]",
        "https://nsa.gov1.info/utah-data-center",
        "https://www.hybrid-analysis.com/sample/92a5be2893743435b79e94aa64a74233a2240fd790ca948e1cb046da5b4072f1/651057d67b30f0a0990f71ee",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win32:malware-gen",
            "Worm:win32/mofksys.rnd!mtb",
            "Beach research",
            "Amadey",
            "Malware",
            "Artro",
            "Trojanspy:win32/nivdort.cw",
            "States",
            "#virtool:win32/obfuscator.adb",
            "#lowfi:lua:autoitv3craftedoverlay",
            "Et",
            "Trojan:win32/floxif.e",
            "Dropper.dapato",
            "Qbot",
            "Crypt3.bwvy",
            "Trojan:win32/zusy",
            "Blacknet rat",
            "Threatfox",
            "Vdehu.a",
            "Dropper.generic_r.ec",
            "Alf:exploit:win32/gsharedinforef.a",
            "Webtoolbar",
            "Wannacry",
            "Cobalt strike",
            "Alf:trojan:win32/zbot",
            "Qakbot",
            "Maltiverse",
            "Gamehack",
            "Generic",
            "Trojan.js.obfjs",
            "Trojan:win32/magania.dsk!mtb",
            "Blacknet",
            "Androidoverlaymalware - mob-s0012",
            "A variant of win32/kryptik.deoa",
            "Babar",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Virtool:win32/injector.gen!bq",
            "Heur:trojan.bat",
            "Privateloader",
            "Trojanspy"
          ],
          "industries": [
            "Telecommunications",
            "Technology",
            "Civilian",
            "Government",
            "Civil society",
            "Financial"
          ],
          "unique_indicators": 70905
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/cdnforplugins.com",
    "whois": "http://whois.domaintools.com/cdnforplugins.com",
    "domain": "cdnforplugins.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 16,
  "pulses": [
    {
      "id": "68ae5b9ef87646927a236b61",
      "name": "Privacy - Google Videos Search - Web Applications Stack Exchange = WannaCry",
      "description": "Description: dfir.blog - A blog about Digital Forensics & Incident Response\ndfir.blog\nDigital forensics, web browsers, visualizations, & open source tools.\n#monitoring #dod(?) #chinacache #crypt #ransom#infectedsystems",
      "modified": "2025-09-26T00:01:12.214000",
      "created": "2025-08-27T01:13:02.780000",
      "tags": [
        "google",
        "mullvad browser",
        "value",
        "incognito mode",
        "mine",
        "unix time",
        "friday",
        "january",
        "does",
        "tor browser",
        "search",
        "show",
        "langchinese",
        "packing t1045",
        "t1045",
        "medium",
        "pe resource",
        "module load",
        "t1129",
        "service",
        "trojan",
        "copy",
        "dock",
        "write",
        "malware",
        "clock",
        "united",
        "passive dns",
        "urls",
        "next associated",
        "gmt cache",
        "ipv4 add",
        "pulse pulses",
        "files",
        "reverse dns",
        "win32",
        "title",
        "location united",
        "america flag",
        "america asn",
        "as15169 google",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "present aug",
        "china unknown",
        "creation date",
        "date",
        "domain",
        "ip address",
        "domain name",
        "expiration date",
        "status ok",
        "nanjing",
        "accept",
        "body",
        "div td",
        "td tr",
        "div div",
        "span span",
        "a li",
        "span p",
        "p div",
        "moved",
        "a domains",
        "open",
        "span",
        "uuupupu",
        "t1055",
        "process32nextw",
        "high",
        "windows",
        "high defense",
        "evasion",
        "delphi",
        "google gmail",
        "images sign",
        "advanced search",
        "solutions",
        "privacy",
        "store gmail",
        "delete delete",
        "report",
        "how search",
        "applying ai",
        "settings search",
        "advanced",
        "search search",
        "search help",
        "domainabuse",
        "showing",
        "hostname add",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "read c",
        "tlsv1",
        "whitelisted",
        "port",
        "destination",
        "ascii text",
        "next",
        "encrypt",
        "script urls",
        "msie",
        "chrome",
        "bad gateway",
        "script domains",
        "present feb",
        "link",
        "meta",
        "digital",
        "language",
        "body doctype",
        "ghost",
        "present jun",
        "aaaa",
        "present jul",
        "present oct",
        "record value",
        "yara detections",
        "dock zone",
        "top source",
        "top destination",
        "source source",
        "filehash",
        "code",
        "error",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "execution",
        "persistence",
        "tulach",
        "brian sabey",
        "dod network",
        "orgtechref",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "whois server",
        "entity dnic",
        "handle",
        "whois lookup",
        "dod",
        "et trojan",
        "server header",
        "suspicious",
        "et info",
        "unknown",
        "virustotal",
        "specified",
        "download",
        "et",
        "please",
        "type size",
        "first seen",
        "loading",
        "python wheel",
        "dynamicloader",
        "intel",
        "ms windows",
        "pe32",
        "entries",
        "user agent",
        "powershell",
        "agent",
        "yara rule",
        "checks",
        "levelblue",
        "open threat",
        "observed dns",
        "query",
        "dns lookup",
        "msdos",
        "wannacry dns",
        "lookup",
        "wannacry",
        "worm",
        "explorer",
        "msil",
        "darkcomet",
        "ping",
        "tools",
        "capture",
        "hallrender",
        "dga domains",
        "unfurl sites",
        "honey net",
        "bot",
        "nxdomain",
        "potential-c2"
      ],
      "references": [
        "Don\u2019t click! https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | Infected systems",
        "DoD Network Information Center (DNIC)",
        "DoD Network Information Center disa.columbus.ns.mbx.arin-registrations@mail.mil [seen throughout}",
        "Python Wheel package",
        "https://www.google.com/search",
        "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com",
        "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Magania.DSK!MTB",
          "display_name": "Trojan:Win32/Magania.DSK!MTB",
          "target": "/malware/Trojan:Win32/Magania.DSK!MTB"
        },
        {
          "id": "Trojan:Win32/Zusy",
          "display_name": "Trojan:Win32/Zusy",
          "target": "/malware/Trojan:Win32/Zusy"
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "a variant of Win32/Kryptik.DEOA",
          "display_name": "a variant of Win32/Kryptik.DEOA",
          "target": null
        },
        {
          "id": "ALF:Exploit:Win32/gSharedInfoRef.A",
          "display_name": "ALF:Exploit:Win32/gSharedInfoRef.A",
          "target": null
        },
        {
          "id": "Wannacry",
          "display_name": "Wannacry",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1054",
          "name": "Indicator Blocking",
          "display_name": "T1054 - Indicator Blocking"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [
        "Telecommunications",
        "Technology",
        "Civilian"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8221,
        "domain": 1216,
        "FileHash-SHA256": 2434,
        "FileHash-MD5": 296,
        "FileHash-SHA1": 155,
        "hostname": 2939,
        "email": 7,
        "SSLCertFingerprint": 8,
        "CIDR": 2
      },
      "indicator_count": 15278,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "205 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aafd0e93efa420f74123c",
      "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
      "description": "",
      "modified": "2024-10-12T01:00:47.836000",
      "created": "2023-12-02T04:17:20.189000",
      "tags": [
        "ssl certificate",
        "contacted",
        "threat roundup",
        "whois record",
        "communicating",
        "subdomains",
        "resolutions",
        "june",
        "july",
        "october",
        "august",
        "noname057",
        "generic malware",
        "ice fog",
        "tag count",
        "thu nov",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "generic",
        "detection list",
        "blacklist http",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "safe site",
        "million",
        "malware",
        "alexa",
        "malware site",
        "malicious site",
        "unsafe",
        "artemis",
        "fakealert",
        "exploit",
        "opencandy",
        "riskware",
        "genkryptik",
        "iframe",
        "tiggre",
        "presenoker",
        "agent",
        "conduit",
        "wacatac",
        "phishing",
        "redline stealer",
        "dropper",
        "cobalt strike",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "filetour",
        "cleaner",
        "installpack",
        "xrat",
        "fusioncore",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet rat",
        "stealer",
        "maltiverse",
        "webtoolbar",
        "trojanspy",
        "united",
        "engineering",
        "cyber threat",
        "phishing site",
        "america",
        "emotet",
        "zbot",
        "malicious",
        "steam",
        "team",
        "indonesia",
        "miner",
        "ransomware",
        "ramnit",
        "pe resource",
        "historical ssl",
        "execution",
        "hacktool",
        "metasploit",
        "relic",
        "monitoring",
        "android",
        "skynet",
        "et",
        "anonymizer",
        "trojanx",
        "back",
        "laplasclipper",
        "win64",
        "trojan",
        "ghost rat",
        "suppobox",
        "asyncrat",
        "union",
        "samples",
        "blacklist",
        "malicious url",
        "hostname",
        "hostnames",
        "tsara brashears",
        "reinsurance",
        "pinnacol insurance",
        "industry and commerce",
        "state",
        "danger",
        "warning",
        "nr-data.net",
        "apple",
        "data.net",
        "asp.net",
        "domains",
        "hashes",
        "reverse dns",
        "general full",
        "resource",
        "software",
        "asn15169",
        "google",
        "url http",
        "server",
        "hash",
        "get h2",
        "main",
        "cookie",
        "thu dec",
        "germany",
        "frankfurt",
        "netherlands",
        "asn20446",
        "highwinds3",
        "page url",
        "search live",
        "api blog",
        "docs pricing",
        "tags",
        "november",
        "us summary",
        "http",
        "google safe",
        "browsing",
        "adware",
        "xtrat",
        "firehol",
        "microsoft",
        "control server",
        "services",
        "msil",
        "hiloti",
        "asn16509",
        "amazon02",
        "fastly",
        "asn54113",
        "prague",
        "login",
        "listen live",
        "centura health",
        "colorado jobs",
        "eeo public",
        "filing url",
        "blacklist https",
        "mimikatz",
        "beach research",
        "de indicators",
        "copyright",
        "gmbh version",
        "follow",
        "softcnapp",
        "philadelphia",
        "gamehack",
        "value",
        "line",
        "variables",
        "nreum",
        "postrelease",
        "url https",
        "security tls",
        "protocol h2",
        "name value",
        "scam",
        "gesponsert url",
        "outputldjh",
        "oid2",
        "uhis2",
        "uh1200",
        "uw1600",
        "uah1200",
        "uaw1600",
        "ucd24",
        "usd1",
        "utz60",
        "no data",
        "coinminer",
        "ip address",
        "exchange",
        "http attacker",
        "states",
        "jimburkedentistry",
        "leder-family",
        "adam lee",
        "erika lee",
        "malvertizing"
      ],
      "references": [
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "http://tracks.theleders.family",
        "photos.theleders.family",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "http://mobtrack.trkclk.net",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "nr-data.net",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "103.233.208.9                    (CNC IP)",
        "apex.jquery.com             (scammer | works for who?)",
        "api.useragentswitch.com",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "dns.google                          (DNS client services - Doug Cole)",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "apple-dns.net",
        "emails.redvue.com  (apple DNS w/amvima)",
        "142.250.180.4 (init.ess)",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "freeimdatingsites.thomasdobo.eu",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "https://urlscan.io/domain/maxwam.tk",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6562908e28e6cdc237fbf8db",
      "export_count": 107,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1956,
        "FileHash-SHA1": 867,
        "FileHash-SHA256": 3895,
        "URL": 11195,
        "domain": 2959,
        "hostname": 3575,
        "CVE": 16,
        "SSLCertFingerprint": 1,
        "email": 1
      },
      "indicator_count": 24465,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "554 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea56ae1992b02a25aa5c51",
      "name": "TrojanSpy:Win32/Nivdort | Affected OTX accounts | Yotta  Network",
      "description": "Part II -Some users OTX accounts connected to the following | Unexpected revelation | A group of hackers masquerading as attorneys, government officials, advocates, fake nsa, security professional, help desk, etc. I don't know the association with otx.alienvault. Unauthorized logins OTX users. accounts. Deleted and modified pulses, etc. Needs further research for me to fully understand.",
      "modified": "2024-04-06T23:03:19.046000",
      "created": "2024-03-08T00:07:10.521000",
      "tags": [
        "methodpost",
        "threat",
        "iocs",
        "urls http",
        "samples",
        "cnc",
        "phishing",
        "ransom",
        "emotet",
        "fraud services",
        "command _and_control",
        "trojan",
        "scanning host",
        "active threat",
        "malicious",
        "date hash",
        "avast avg",
        "susp",
        "win32",
        "paste",
        "hostnames",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "headers date",
        "connection",
        "first",
        "utc submissions",
        "submitters",
        "computer",
        "company limited",
        "gandi sas",
        "ovh sas",
        "export",
        "summary iocs",
        "graph community",
        "limited",
        "yotta network",
        "gvb gelimed",
        "kb microsoft",
        "indonesia",
        "kyriazhs1975",
        "vj79",
        "bc https",
        "rexxfield",
        "brian sabey",
        "as21342",
        "united",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "msie",
        "chrome",
        "creation date",
        "search",
        "dnssec",
        "entries",
        "body",
        "date",
        "as63949 linode",
        "mtb feb",
        "checkin m1",
        "gmt content",
        "type",
        "encrypt",
        "trojan",
        "artro",
        "moved",
        "pulse pulses",
        "yotta data",
        "yotta",
        "private limited",
        "india",
        "limited yotta",
        "number",
        "as140641",
        "network",
        "facebook",
        "info",
        "cisco umbrella",
        "site",
        "alexa top",
        "site top",
        "million",
        "safe site",
        "million alexa",
        "site safe",
        "cobalt strike",
        "malicious url",
        "blacknet rat",
        "union",
        "vidar",
        "malware",
        "stealer",
        "bank",
        "alexa",
        "deepscan",
        "phishing",
        "team",
        "super",
        "blacknet",
        "babar",
        "detection list",
        "blacklist http",
        "sample",
        "submission",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "kb body",
        "path",
        "as396982 google",
        "bq mar",
        "win32cve mar",
        "exploit",
        "virtool",
        "status",
        "name servers",
        "emails",
        "servers",
        "next",
        "files",
        "as44273 host",
        "germany unknown",
        "expiration date",
        "showing",
        "win32upatre mar",
        "milehighmedia",
        "ids detections",
        "possible fake",
        "av checkin",
        "initial checkin",
        "checkin",
        "utah data",
        "center",
        "june",
        "data center",
        "responsible",
        "nsa utah",
        "march",
        "closeup view",
        "july",
        "view",
        "february",
        "prism",
        "cascade",
        "darpa",
        "twitter",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "nxdomain",
        "whitelisted",
        "domain",
        "as54113",
        "msil",
        "cryp",
        "files show",
        "entries related",
        "domains",
        "as15169 google",
        "gmt cache",
        "sameorigin",
        "trojandropper",
        "asnone united",
        "title error",
        "porkbun",
        "mtb mar",
        "trojanspy",
        "installer",
        "loader",
        "hijacker",
        "targeting",
        "as30456",
        "sec ch",
        "for privacy",
        "ch ua",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "lowfi",
        "dns replication",
        "ip detections",
        "country",
        "contacted",
        "graph",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid file",
        "file size",
        "open threat",
        "learn",
        "html info",
        "exchange meta",
        "tags twitter",
        "alienvault",
        "script tags",
        "iframe tags",
        "google tag",
        "manager anchor",
        "iana",
        "whois lookup",
        "ipv4 address",
        "ripe ncc",
        "afrinic",
        "africa",
        "apnic",
        "asia pacific",
        "arin",
        "lacnic",
        "google",
        "amazon ec2",
        "email",
        "city",
        "server",
        "amazon data",
        "amazon",
        "code",
        "form",
        "po box",
        "tech",
        "show",
        "description ype",
        "collections",
        "partru",
        "execution",
        "fake host"
      ],
      "references": [
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "https://www.milehighmedia.com/legal/2257",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "https://nsa.gov1.info/utah-data-center",
        "https://softwaremill.com/grpc-vs-rest/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Arab Emirates"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort.CW",
          "display_name": "TrojanSpy:Win32/Nivdort.CW",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
        },
        {
          "id": "AndroidOverlayMalware - MOB-S0012",
          "display_name": "AndroidOverlayMalware - MOB-S0012",
          "target": null
        },
        {
          "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "target": null
        },
        {
          "id": "Crypt3.BWVY",
          "display_name": "Crypt3.BWVY",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "Dropper.Generic_r.EC",
          "display_name": "Dropper.Generic_r.EC",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Zbot",
          "display_name": "ALF:Trojan:Win32/Zbot",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1605",
          "name": "Command-Line Interface",
          "display_name": "T1605 - Command-Line Interface"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology",
        "Financial"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 59,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6765,
        "FileHash-MD5": 688,
        "FileHash-SHA1": 422,
        "FileHash-SHA256": 3169,
        "domain": 2171,
        "hostname": 1714,
        "email": 11,
        "CVE": 2,
        "CIDR": 2
      },
      "indicator_count": 14944,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "742 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eadaae65b9123721198d08",
      "name": "Nivdort | Affected OTX accounts | Yotta Network (Cloned OTX user)",
      "description": "",
      "modified": "2024-04-06T23:03:19.046000",
      "created": "2024-03-08T09:30:22.295000",
      "tags": [
        "methodpost",
        "threat",
        "iocs",
        "urls http",
        "samples",
        "cnc",
        "phishing",
        "ransom",
        "emotet",
        "fraud services",
        "command _and_control",
        "trojan",
        "scanning host",
        "active threat",
        "malicious",
        "date hash",
        "avast avg",
        "susp",
        "win32",
        "paste",
        "hostnames",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "headers date",
        "connection",
        "first",
        "utc submissions",
        "submitters",
        "computer",
        "company limited",
        "gandi sas",
        "ovh sas",
        "export",
        "summary iocs",
        "graph community",
        "limited",
        "yotta network",
        "gvb gelimed",
        "kb microsoft",
        "indonesia",
        "kyriazhs1975",
        "vj79",
        "bc https",
        "rexxfield",
        "brian sabey",
        "as21342",
        "united",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "msie",
        "chrome",
        "creation date",
        "search",
        "dnssec",
        "entries",
        "body",
        "date",
        "as63949 linode",
        "mtb feb",
        "checkin m1",
        "gmt content",
        "type",
        "encrypt",
        "trojan",
        "artro",
        "moved",
        "pulse pulses",
        "yotta data",
        "yotta",
        "private limited",
        "india",
        "limited yotta",
        "number",
        "as140641",
        "network",
        "facebook",
        "info",
        "cisco umbrella",
        "site",
        "alexa top",
        "site top",
        "million",
        "safe site",
        "million alexa",
        "site safe",
        "cobalt strike",
        "malicious url",
        "blacknet rat",
        "union",
        "vidar",
        "malware",
        "stealer",
        "bank",
        "alexa",
        "deepscan",
        "phishing",
        "team",
        "super",
        "blacknet",
        "babar",
        "detection list",
        "blacklist http",
        "sample",
        "submission",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "kb body",
        "path",
        "as396982 google",
        "bq mar",
        "win32cve mar",
        "exploit",
        "virtool",
        "status",
        "name servers",
        "emails",
        "servers",
        "next",
        "files",
        "as44273 host",
        "germany unknown",
        "expiration date",
        "showing",
        "win32upatre mar",
        "milehighmedia",
        "ids detections",
        "possible fake",
        "av checkin",
        "initial checkin",
        "checkin",
        "utah data",
        "center",
        "june",
        "data center",
        "responsible",
        "nsa utah",
        "march",
        "closeup view",
        "july",
        "view",
        "february",
        "prism",
        "cascade",
        "darpa",
        "twitter",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "nxdomain",
        "whitelisted",
        "domain",
        "as54113",
        "msil",
        "cryp",
        "files show",
        "entries related",
        "domains",
        "as15169 google",
        "gmt cache",
        "sameorigin",
        "trojandropper",
        "asnone united",
        "title error",
        "porkbun",
        "mtb mar",
        "trojanspy",
        "installer",
        "loader",
        "hijacker",
        "targeting",
        "as30456",
        "sec ch",
        "for privacy",
        "ch ua",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "lowfi",
        "dns replication",
        "ip detections",
        "country",
        "contacted",
        "graph",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid file",
        "file size",
        "open threat",
        "learn",
        "html info",
        "exchange meta",
        "tags twitter",
        "alienvault",
        "script tags",
        "iframe tags",
        "google tag",
        "manager anchor",
        "iana",
        "whois lookup",
        "ipv4 address",
        "ripe ncc",
        "afrinic",
        "africa",
        "apnic",
        "asia pacific",
        "arin",
        "lacnic",
        "google",
        "amazon ec2",
        "email",
        "city",
        "server",
        "amazon data",
        "amazon",
        "code",
        "form",
        "po box",
        "tech",
        "show",
        "description ype",
        "collections",
        "partru",
        "execution",
        "fake host"
      ],
      "references": [
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "https://www.milehighmedia.com/legal/2257",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "https://nsa.gov1.info/utah-data-center",
        "https://softwaremill.com/grpc-vs-rest/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Arab Emirates"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort.CW",
          "display_name": "TrojanSpy:Win32/Nivdort.CW",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
        },
        {
          "id": "AndroidOverlayMalware - MOB-S0012",
          "display_name": "AndroidOverlayMalware - MOB-S0012",
          "target": null
        },
        {
          "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "target": null
        },
        {
          "id": "Crypt3.BWVY",
          "display_name": "Crypt3.BWVY",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "Dropper.Generic_r.EC",
          "display_name": "Dropper.Generic_r.EC",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Zbot",
          "display_name": "ALF:Trojan:Win32/Zbot",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1605",
          "name": "Command-Line Interface",
          "display_name": "T1605 - Command-Line Interface"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology",
        "Financial"
      ],
      "TLP": "white",
      "cloned_from": "65ea56ae1992b02a25aa5c51",
      "export_count": 63,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6765,
        "FileHash-MD5": 688,
        "FileHash-SHA1": 422,
        "FileHash-SHA256": 3169,
        "domain": 2171,
        "hostname": 1714,
        "email": 11,
        "CVE": 2,
        "CIDR": 2
      },
      "indicator_count": 14944,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "742 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c994c8b145925072b6583a",
      "name": "Private Loader cyber threat - Sliq.net | https://house.mo.gov",
      "description": "Link found active  in https://house.mo.gov. \nhttps://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1 |",
      "modified": "2024-03-13T03:00:40.889000",
      "created": "2024-02-12T03:47:20.138000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "referrer",
        "historical ssl",
        "remcos rat",
        "august",
        "iocs",
        "contacted",
        "qakbot",
        "june",
        "service",
        "privateloader",
        "amadey",
        "blacknet rat",
        "qbot",
        "cobalt strike",
        "push",
        "core",
        "malformed domains",
        "sliq",
        "typosquatting",
        "malware",
        "network",
        "dns",
        "spyware",
        "access",
        "remote",
        "cyber threat",
        "virus network",
        "command and control",
        "remote connections",
        "exploits",
        "injection",
        "legislature",
        "trojan",
        "scanning host",
        "threat analyzer",
        "threat",
        "paste",
        "urls https",
        "locationchamber",
        "viewmode3",
        "hostnames",
        "url https",
        "false layer",
        "http"
      ],
      "references": [
        "https://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1",
        "https://www.facebooksunglassshop.com [pegasus related]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "PrivateLoader",
          "display_name": "PrivateLoader",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1608.002",
          "name": "Upload Tool",
          "display_name": "T1608.002 - Upload Tool"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        }
      ],
      "industries": [
        "Government",
        "Technology",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 56,
        "FileHash-SHA1": 36,
        "FileHash-SHA256": 1384,
        "CVE": 5,
        "URL": 1865,
        "domain": 222,
        "hostname": 648
      },
      "indicator_count": 4216,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "767 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab679e6ff8544ecf11962",
      "name": "Private Loader cyber threat - Sliq.net | https://house.mo.gov ",
      "description": "",
      "modified": "2024-03-13T03:00:40.889000",
      "created": "2024-02-13T00:23:21.062000",
      "tags": [
        "ssl certificate",
        "threat roundup",
        "referrer",
        "historical ssl",
        "remcos rat",
        "august",
        "iocs",
        "contacted",
        "qakbot",
        "june",
        "service",
        "privateloader",
        "amadey",
        "blacknet rat",
        "qbot",
        "cobalt strike",
        "push",
        "core",
        "malformed domains",
        "sliq",
        "typosquatting",
        "malware",
        "network",
        "dns",
        "spyware",
        "access",
        "remote",
        "cyber threat",
        "virus network",
        "command and control",
        "remote connections",
        "exploits",
        "injection",
        "legislature",
        "trojan",
        "scanning host",
        "threat analyzer",
        "threat",
        "paste",
        "urls https",
        "locationchamber",
        "viewmode3",
        "hostnames",
        "url https",
        "false layer",
        "http"
      ],
      "references": [
        "https://sg001-harmony.sliq.net/00325/harmony/en/PowerBrowser/RoomRouter?location=chamber&viewMode=3&globalStreamId=1",
        "https://www.facebooksunglassshop.com [pegasus related]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "PrivateLoader",
          "display_name": "PrivateLoader",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1608.002",
          "name": "Upload Tool",
          "display_name": "T1608.002 - Upload Tool"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        }
      ],
      "industries": [
        "Government",
        "Technology",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": "65c994c8b145925072b6583a",
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 56,
        "FileHash-SHA1": 36,
        "FileHash-SHA256": 1384,
        "CVE": 5,
        "URL": 1865,
        "domain": 222,
        "hostname": 648
      },
      "indicator_count": 4216,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "767 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6562908e28e6cdc237fbf8db",
      "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
      "description": "",
      "modified": "2023-12-26T00:03:03.925000",
      "created": "2023-11-26T00:25:50.529000",
      "tags": [
        "ssl certificate",
        "contacted",
        "threat roundup",
        "whois record",
        "communicating",
        "subdomains",
        "resolutions",
        "june",
        "july",
        "october",
        "august",
        "noname057",
        "generic malware",
        "ice fog",
        "tag count",
        "thu nov",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "generic",
        "detection list",
        "blacklist http",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "safe site",
        "million",
        "malware",
        "alexa",
        "malware site",
        "malicious site",
        "unsafe",
        "artemis",
        "fakealert",
        "exploit",
        "opencandy",
        "riskware",
        "genkryptik",
        "iframe",
        "tiggre",
        "presenoker",
        "agent",
        "conduit",
        "wacatac",
        "phishing",
        "redline stealer",
        "dropper",
        "cobalt strike",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "filetour",
        "cleaner",
        "installpack",
        "xrat",
        "fusioncore",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet rat",
        "stealer",
        "maltiverse",
        "webtoolbar",
        "trojanspy",
        "united",
        "engineering",
        "cyber threat",
        "phishing site",
        "america",
        "emotet",
        "zbot",
        "malicious",
        "steam",
        "team",
        "indonesia",
        "miner",
        "ransomware",
        "ramnit",
        "pe resource",
        "historical ssl",
        "execution",
        "hacktool",
        "metasploit",
        "relic",
        "monitoring",
        "android",
        "skynet",
        "et",
        "anonymizer",
        "trojanx",
        "back",
        "laplasclipper",
        "win64",
        "trojan",
        "ghost rat",
        "suppobox",
        "asyncrat",
        "union",
        "samples",
        "blacklist",
        "malicious url",
        "hostname",
        "hostnames",
        "tsara brashears",
        "reinsurance",
        "pinnacol insurance",
        "industry and commerce",
        "state",
        "danger",
        "warning",
        "nr-data.net",
        "apple",
        "data.net",
        "asp.net",
        "domains",
        "hashes",
        "reverse dns",
        "general full",
        "resource",
        "software",
        "asn15169",
        "google",
        "url http",
        "server",
        "hash",
        "get h2",
        "main",
        "cookie",
        "thu dec",
        "germany",
        "frankfurt",
        "netherlands",
        "asn20446",
        "highwinds3",
        "page url",
        "search live",
        "api blog",
        "docs pricing",
        "tags",
        "november",
        "us summary",
        "http",
        "google safe",
        "browsing",
        "adware",
        "xtrat",
        "firehol",
        "microsoft",
        "control server",
        "services",
        "msil",
        "hiloti",
        "asn16509",
        "amazon02",
        "fastly",
        "asn54113",
        "prague",
        "login",
        "listen live",
        "centura health",
        "colorado jobs",
        "eeo public",
        "filing url",
        "blacklist https",
        "mimikatz",
        "beach research",
        "de indicators",
        "copyright",
        "gmbh version",
        "follow",
        "softcnapp",
        "philadelphia",
        "gamehack",
        "value",
        "line",
        "variables",
        "nreum",
        "postrelease",
        "url https",
        "security tls",
        "protocol h2",
        "name value",
        "scam",
        "gesponsert url",
        "outputldjh",
        "oid2",
        "uhis2",
        "uh1200",
        "uw1600",
        "uah1200",
        "uaw1600",
        "ucd24",
        "usd1",
        "utz60",
        "no data",
        "coinminer",
        "ip address",
        "exchange",
        "http attacker",
        "states",
        "jimburkedentistry",
        "leder-family",
        "adam lee",
        "erika lee",
        "malvertizing"
      ],
      "references": [
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "http://tracks.theleders.family",
        "photos.theleders.family",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "http://mobtrack.trkclk.net",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "nr-data.net",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "103.233.208.9                    (CNC IP)",
        "apex.jquery.com             (scammer | works for who?)",
        "api.useragentswitch.com",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "dns.google                          (DNS client services - Doug Cole)",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "apple-dns.net",
        "emails.redvue.com  (apple DNS w/amvima)",
        "142.250.180.4 (init.ess)",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "freeimdatingsites.thomasdobo.eu",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "https://urlscan.io/domain/maxwam.tk",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 83,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1956,
        "FileHash-SHA1": 867,
        "FileHash-SHA256": 3751,
        "URL": 10878,
        "domain": 2914,
        "hostname": 3520,
        "CVE": 16
      },
      "indicator_count": 23902,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aafce24b001cba328dcbc",
      "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
      "description": "",
      "modified": "2023-12-26T00:03:03.925000",
      "created": "2023-12-02T04:17:18.188000",
      "tags": [
        "ssl certificate",
        "contacted",
        "threat roundup",
        "whois record",
        "communicating",
        "subdomains",
        "resolutions",
        "june",
        "july",
        "october",
        "august",
        "noname057",
        "generic malware",
        "ice fog",
        "tag count",
        "thu nov",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "generic",
        "detection list",
        "blacklist http",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "safe site",
        "million",
        "malware",
        "alexa",
        "malware site",
        "malicious site",
        "unsafe",
        "artemis",
        "fakealert",
        "exploit",
        "opencandy",
        "riskware",
        "genkryptik",
        "iframe",
        "tiggre",
        "presenoker",
        "agent",
        "conduit",
        "wacatac",
        "phishing",
        "redline stealer",
        "dropper",
        "cobalt strike",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "filetour",
        "cleaner",
        "installpack",
        "xrat",
        "fusioncore",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet rat",
        "stealer",
        "maltiverse",
        "webtoolbar",
        "trojanspy",
        "united",
        "engineering",
        "cyber threat",
        "phishing site",
        "america",
        "emotet",
        "zbot",
        "malicious",
        "steam",
        "team",
        "indonesia",
        "miner",
        "ransomware",
        "ramnit",
        "pe resource",
        "historical ssl",
        "execution",
        "hacktool",
        "metasploit",
        "relic",
        "monitoring",
        "android",
        "skynet",
        "et",
        "anonymizer",
        "trojanx",
        "back",
        "laplasclipper",
        "win64",
        "trojan",
        "ghost rat",
        "suppobox",
        "asyncrat",
        "union",
        "samples",
        "blacklist",
        "malicious url",
        "hostname",
        "hostnames",
        "tsara brashears",
        "reinsurance",
        "pinnacol insurance",
        "industry and commerce",
        "state",
        "danger",
        "warning",
        "nr-data.net",
        "apple",
        "data.net",
        "asp.net",
        "domains",
        "hashes",
        "reverse dns",
        "general full",
        "resource",
        "software",
        "asn15169",
        "google",
        "url http",
        "server",
        "hash",
        "get h2",
        "main",
        "cookie",
        "thu dec",
        "germany",
        "frankfurt",
        "netherlands",
        "asn20446",
        "highwinds3",
        "page url",
        "search live",
        "api blog",
        "docs pricing",
        "tags",
        "november",
        "us summary",
        "http",
        "google safe",
        "browsing",
        "adware",
        "xtrat",
        "firehol",
        "microsoft",
        "control server",
        "services",
        "msil",
        "hiloti",
        "asn16509",
        "amazon02",
        "fastly",
        "asn54113",
        "prague",
        "login",
        "listen live",
        "centura health",
        "colorado jobs",
        "eeo public",
        "filing url",
        "blacklist https",
        "mimikatz",
        "beach research",
        "de indicators",
        "copyright",
        "gmbh version",
        "follow",
        "softcnapp",
        "philadelphia",
        "gamehack",
        "value",
        "line",
        "variables",
        "nreum",
        "postrelease",
        "url https",
        "security tls",
        "protocol h2",
        "name value",
        "scam",
        "gesponsert url",
        "outputldjh",
        "oid2",
        "uhis2",
        "uh1200",
        "uw1600",
        "uah1200",
        "uaw1600",
        "ucd24",
        "usd1",
        "utz60",
        "no data",
        "coinminer",
        "ip address",
        "exchange",
        "http attacker",
        "states",
        "jimburkedentistry",
        "leder-family",
        "adam lee",
        "erika lee",
        "malvertizing"
      ],
      "references": [
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "http://tracks.theleders.family",
        "photos.theleders.family",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "http://mobtrack.trkclk.net",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "nr-data.net",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "103.233.208.9                    (CNC IP)",
        "apex.jquery.com             (scammer | works for who?)",
        "api.useragentswitch.com",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "dns.google                          (DNS client services - Doug Cole)",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "apple-dns.net",
        "emails.redvue.com  (apple DNS w/amvima)",
        "142.250.180.4 (init.ess)",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "freeimdatingsites.thomasdobo.eu",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "https://urlscan.io/domain/maxwam.tk",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6562908e28e6cdc237fbf8db",
      "export_count": 78,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1956,
        "FileHash-SHA1": 867,
        "FileHash-SHA256": 3751,
        "URL": 10878,
        "domain": 2914,
        "hostname": 3520,
        "CVE": 16
      },
      "indicator_count": 23902,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a91b1702fdce6c496a1e",
      "name": "note.html                                                                    [Pulse by OctoSeek]",
      "description": "",
      "modified": "2023-12-06T17:02:19.096000",
      "created": "2023-12-06T17:02:19.096000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "CVE": 2,
        "FileHash-SHA256": 1422,
        "domain": 481,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a69b0f11713d9e4d0153",
      "name": "note.html",
      "description": "",
      "modified": "2023-12-06T16:51:39.617000",
      "created": "2023-12-06T16:51:39.617000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "CVE": 2,
        "FileHash-SHA256": 1422,
        "domain": 481,
        "URL": 2694,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29
      },
      "indicator_count": 5568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cdnforplugins.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cdnforplugins.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629318.1093924
}