{
  "type": "URL",
  "indicator": "https://cert.microsoft.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cert.microsoft.com",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #19",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #4",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain microsoft.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain microsoft.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "newssite",
        "message": "Whitelisted news domain microsoft.com",
        "name": "Whitelisted newssite network domain"
      }
    ],
    "base_indicator": {
      "id": 3105866601,
      "indicator": "https://cert.microsoft.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 19,
      "pulses": [
        {
          "id": "69e4ce38b03b0bb283c78a42",
          "name": "CAPE Sandbox- circa 1980",
          "description": "I dont even have windows and its haunting me. The real treasure today was this though.. you were tricky with your 1980's work to find:\na74535b274b8bfa42e4d7dd33fd8703e\n2bcdb3bf34303a29106a3aefa21d611a170443ea\n4da1f382887248188f43e579f6a28163d4337cca2a7d8dc893b58dff35e9c745\n244aaea6a195a18bbd72a13a9a421e72",
          "modified": "2026-04-19T15:02:19.766000",
          "created": "2026-04-19T12:44:40.519000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1064",
              "name": "Scripting",
              "display_name": "T1064 - Scripting"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 90,
            "FileHash-MD5": 196,
            "FileHash-SHA1": 174,
            "FileHash-SHA256": 1546,
            "URL": 157,
            "hostname": 403,
            "domain": 80,
            "CIDR": 4,
            "email": 10
          },
          "indicator_count": 2660,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "5 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d9675a25be662c17cd3a9c",
          "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
          "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
          "modified": "2026-04-19T09:06:31.781000",
          "created": "2026-04-10T21:10:50.646000",
          "tags": [
            "malicious",
            "Microsoft",
            "intent: reckless",
            "wiper",
            "Transip",
            "bankers document gone rogue",
            "Tehran",
            "pdfkit.net",
            "United",
            "broken Docusign seal",
            "esign violation",
            "us lawyers",
            "Iran",
            "IP Abuse US",
            "Spreader",
            "corruption that spread",
            "52.123.250.180",
            "Mass Data Loss and exfiltration",
            "Docusign exploited by insecure workflows",
            "Adobe exploited by insecure workflows",
            "threat map",
            "Infra / healthcare / more at risk from this negligence",
            "remediation: long. expire the certs. block 53..",
            "accountability, NOW.",
            "Burned",
            "Kitplay",
            "iOS",
            "Watering hole",
            "Webkit",
            "Religious Regime",
            "MS Office",
            "Compliance Hold Purgatory",
            "WIN EXE.32",
            "Firmware neutral",
            "Trusted Insider",
            "DKIM, SPF, DMARC Failures",
            "No Problems"
          ],
          "references": [
            "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
            "People who exploit this put the US at risk. Bottom line.",
            "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
            "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
            "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
            "",
            "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
            "This document might expose someone, more than another.",
            "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
            "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": "69a82c54067ca1d502b1eb6c",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 70,
            "hostname": 227,
            "CVE": 4,
            "URL": 368,
            "domain": 110,
            "IPv4": 34,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 26,
            "CIDR": 4,
            "email": 20,
            "JA3": 1
          },
          "indicator_count": 869,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "11 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d967590f40c612c90ce84f",
          "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
          "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
          "modified": "2026-04-19T09:05:10.432000",
          "created": "2026-04-10T21:10:49.749000",
          "tags": [
            "malicious",
            "Microsoft",
            "intent: reckless",
            "wiper",
            "Transip",
            "bankers document gone rogue",
            "Tehran",
            "pdfkit.net",
            "United",
            "broken Docusign seal",
            "esign violation",
            "us lawyers",
            "Iran",
            "IP Abuse US",
            "Spreader",
            "corruption that spread",
            "52.123.250.180",
            "Mass Data Loss and exfiltration",
            "Docusign exploited by insecure workflows",
            "Adobe exploited by insecure workflows",
            "threat map",
            "Infra / healthcare / more at risk from this negligence",
            "remediation: long. expire the certs. block 53..",
            "accountability, NOW.",
            "Burned",
            "Kitplay",
            "iOS",
            "Watering hole",
            "Webkit",
            "Religious Regime",
            "MS Office",
            "Compliance Hold Purgatory",
            "WIN EXE.32",
            "Firmware neutral",
            "Trusted Insider",
            "DKIM, SPF, DMARC Failures",
            "APKmirror",
            "ILOVEYOUBABY",
            "No Problems",
            "Christmas Tree EXEC Code Red worm Computer virus Nimda",
            "Wanna Cry",
            "APK",
            "DC RAT",
            "Emotnet",
            "Redline Swiper",
            "Open Door",
            "Bankers Document",
            "Y2K",
            "wsscript.exe, VBE",
            "Compliance Lock Trap",
            "Globalsign 2020 (potentially exploited)",
            "Heuristic Smear",
            "Gatsby Library Loader DLL",
            "w31999",
            "UofA"
          ],
          "references": [
            "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
            "People who exploit this put the US at risk. Bottom line.",
            "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
            "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
            "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
            "",
            "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
            "This document might expose someone, more than another.",
            "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
            "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
            "Micro - Dates to look for specific: April/May/June 2025",
            "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
            "Amazon- Check new cert subscribers on or around Sept 15 2025",
            "Entrust to Sectigo- Review vendors",
            "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
            "CA DMV- 2020 exploits, if even exist in your records, may be related.",
            "Digi/Global Sign - audit 2020 digital intersect",
            "Proton.me/Zenbox: Audit July 2025",
            "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
            "APKMirror https://www.apkmirror.com",
            "Google Docs 1.25.202.02 APK Download by Google LLC",
            "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025.",
            "Y2K",
            "US, Philippines, Ukraine, Iran, China. Alberta.",
            "France",
            "Germany, Austria, and Switzerland GmbH",
            "Gatsby Library Loader, DLL",
            "Spellbinding! Indeed. SpellEditor.exe"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": "69a82c54067ca1d502b1eb6c",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3516,
            "hostname": 1614,
            "CVE": 7,
            "URL": 1806,
            "domain": 1416,
            "IPv4": 888,
            "FileHash-MD5": 731,
            "FileHash-SHA1": 787,
            "CIDR": 6,
            "email": 27,
            "IPv6": 10,
            "JA3": 2
          },
          "indicator_count": 10810,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "11 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "698e93e1ab02db8c49e8c3ed",
          "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
          "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
          "modified": "2026-04-19T08:11:41.130000",
          "created": "2026-02-13T03:00:49.872000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27678,
            "FileHash-SHA256": 47676,
            "FileHash-MD5": 42534,
            "FileHash-SHA1": 23213,
            "hostname": 33703,
            "URL": 75433,
            "SSLCertFingerprint": 30,
            "CVE": 7582,
            "email": 313,
            "FileHash-IMPHASH": 8,
            "CIDR": 26205,
            "JA3": 1,
            "IPv4": 80,
            "URI": 5
          },
          "indicator_count": 284461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "12 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1b46238df27ff6680430a",
          "name": "Analysis- 12/12/24 Darkgate- 9e4f036dd6fbb45ce414cb5d040b3255b5ccc9ecacbfaf022b631545f9a19a02.zip (MD5: 71E189A0B08891CFFAB6E656FC49E00A) Malicious activity - Interactive analysis ANY.RUN",
          "description": "<<Anomalous binary characteristics have been identified in a file that is being used to compile a Windows operating system for the first time in the history of the software, as well as an unauthorised virus>> Darkgate. Links wouldnt attach. User does not have whatsapp.",
          "modified": "2026-04-17T07:11:13.591000",
          "created": "2026-04-17T04:17:38.518000",
          "tags": [
            "delete",
            "yara detections",
            "high",
            "medium",
            "whatsapp plugin",
            "whatsapp",
            "read",
            "write",
            "top source",
            "top destination",
            "virustotal",
            "guard",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 57,
            "FileHash-MD5": 54,
            "FileHash-SHA1": 50,
            "FileHash-SHA256": 431,
            "URL": 328,
            "hostname": 385,
            "domain": 409,
            "email": 51,
            "CIDR": 40
          },
          "indicator_count": 1805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69db609269c77812f937026e",
          "name": "CAPE Sandbox ----- emulex fc 2.72.011.002-3",
          "description": "emulex fc 2.72.011.002-3, Malware Behavior Catalog Tree\nAnti-Behavioral Analysis\nOB0001\nVirtual Machine Detection\nB0009\nSoftware Packing\nF0001\nAnti-Static Analysis\nOB0002\nSoftware Packing\nF0001\nDefense Evasion\nOB0006\nSoftware Packing\nF0001\nDiscovery\nOB0007\nFile and Directory Discovery\nE1083\nExecution\nOB0009\nCommand and Scripting Interpreter\nE1059\nFile System\nOC0001\nDelete File\nC0047\nGet File Attributes\nC0049\nSet File Attributes\nC0050\nRead File\nC0051\nWrites File\nC0052\nProcess\nOC0003\nTerminate Process\nC0018\nCommunication\nOC0006\nHTTP Communication\nC0002\n\nWho are you protecting? Look at your root certificate map to 2018-19. Im not mad, I am just disappointed in the lack of cyber security awareness and cryptographic failures. If I see one more unsigned DNSSEC. Edge node completely exposed. Maybe let CISA and the NSA handle things since they are competent. unknown agency- #burnedyourowncountry.\nPalo Alto, level blue, falcon sandbox, cape, yomi, sec, arc- you are heroes for picking up malware that evades everything.",
          "modified": "2026-04-15T19:46:25.951000",
          "created": "2026-04-12T09:06:26.754000",
          "tags": [
            "hbanyware",
            "hbas",
            "true",
            "reportlocation",
            "programfiles",
            "command line",
            "enable silent",
            "mode",
            "full",
            "local only",
            "false",
            "path",
            "example",
            "windows sandbox",
            "clear filters",
            "show",
            "fibre channel",
            "emulex fibre",
            "emulex network",
            "fibre chann",
            "host b",
            "network",
            "emulex",
            "network cards",
            "find",
            "UNITED STATES SENT.",
            "Still love USA.",
            "bankers doc",
            "ESign Violation",
            "cyber warfare",
            "Fraud",
            "pdfkit.net",
            "CIVIL rights violation",
            "geofence",
            "whistleblower",
            "adobe exploited from unsafe practices",
            "certificate abuse",
            "wiper",
            "Docusign exploited from unsafe practices",
            "abuse",
            "modification of the record",
            "date changes",
            "deleting evidence",
            "wateringholeleftwideopen#RiskManagementKnowledgeDeficient",
            "firmware neutral",
            "fraud",
            "espionage",
            "Iloveyou.txt",
            "APTnull.",
            "PlutoniumoftheInternet",
            "apiabuse",
            "Put Zen at risk",
            "Microsoft exploited from misuse of power and secure protocols",
            "Spyonyourinternalframework.",
            "fsquirt.[exe]",
            "bluetooth tampering",
            "wormhole",
            "backdoor",
            "GITlikeMITbutSouth",
            "pool",
            "CloseDoorsProper",
            "spellbound.[exe]",
            "Wizard",
            "GUI of Bluetooth File Transfer Wizard",
            "<fsquirt",
            "Silkwood",
            "RF's, EMF's, EF's - beyond reasonable measure",
            "lateral moving world wide higher ed warrants further research, G",
            "emulex fc 2.72.011.002-3"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984872&Signature=X7ut04viSpboUfiHbVbGH602vbGaavKO28%2FuQZ9YCLjbW%2Bl9JHGrffH4HHtGQ39GPFGg3uUwyMpuOewArLSuI0W%2F0SjlRr%2B3ob5iUQ8eckXWI47mIElQtuCwRStAGCclC8lI%2BsnrEI7u%2FvPhk16ucrMhQtHiSehYuWwNi1lQkbG3Y5ZoDqClBlw1uSMm1jm1Gpu1EBVSIeAqmbV33HSK%2FDTrwzhuwObiyOu4RKE9E7MOmj%2",
            "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984910&Signature=hjdKVB1Hclv%2FNw7qh%2FV50rCooI70BC8NJcq77KWRUu6VAlxs8vV%2FWfNLh9VzjKS2pBgR7wAaaDp6GwPof61nS4TwykWgUO%2FavR45JKGxhUsjhYKLE5VQoAZkh13wvx1nTVwH%2FP6fx71mJlF71bDqJe7pjpKdd3jyGRDGC6ksN3fMJ%2FRVnusGPDwzZXpy9F6CUYZ1tT9xuK7k3zz9xdIV5e0noQ9s7P343Ca7ROLOUhs9"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 182,
            "FileHash-MD5": 771,
            "FileHash-SHA1": 836,
            "FileHash-SHA256": 2524,
            "URL": 810,
            "domain": 764,
            "email": 112,
            "hostname": 2635,
            "URI": 3,
            "CVE": 7,
            "CIDR": 12,
            "JA3": 1
          },
          "indicator_count": 8657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a82c54067ca1d502b1eb6c",
          "name": "TTB-Chained (Tehran-Transversal Belasco Chain)",
          "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion.\nThe conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. In Infra/Bank/Gov sectors, TTB executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos",
          "modified": "2026-04-10T21:08:46.934000",
          "created": "2026-03-04T12:57:56.738000",
          "tags": [
            "malicious",
            "Microsoft",
            "intent: reckless",
            "wiper",
            "Transip",
            "bankers document gone rogue",
            "Tehran",
            "pdfkit.net",
            "United",
            "broken Docusign seal",
            "esign violation",
            "us lawyers",
            "Iran",
            "IP Abuse US",
            "Spreader",
            "corruption that spread",
            "52.123.250.180",
            "Mass Data Loss and exfiltration",
            "Docusign exploited by insecure workflows",
            "Adobe exploited by insecure workflows",
            "threat map",
            "Infra / healthcare / more at risk from this negligence",
            "remediation: long. expire the certs. block 53..",
            "accountability, NOW.",
            "Burned",
            "Kitplay",
            "iOS",
            "Watering hole",
            "Webkit",
            "Religious Regime",
            "MS Office",
            "Compliance Hold Purgatory",
            "WIN EXE.32",
            "Firmware neutral",
            "Trusted Insider",
            "DKIM, SPF, DMARC Failures"
          ],
          "references": [
            "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
            "People who exploit this put the US at risk. Bottom line.",
            "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
            "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
            "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
            "",
            "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
            "This document might expose someone, more than another.",
            "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
            "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 70,
            "hostname": 222,
            "CVE": 4,
            "URL": 363,
            "domain": 108,
            "IPv4": 33,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 26,
            "CIDR": 4,
            "email": 20
          },
          "indicator_count": 855,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "8 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d87573143e567e8503beda",
          "name": "CAPE Sandbox - Google Domain Browser",
          "description": "<Google has released a report on malicious code found in a web file. \u00c2\u00a31.5m of data, which is believed to be more than 100 times more powerful than Google's own.> Some insight on a browser sandbox. mitm.",
          "modified": "2026-04-10T04:08:36.918000",
          "created": "2026-04-10T03:58:43.549000",
          "tags": [
            "title",
            "doctype html",
            "google",
            "ce62bb",
            "style",
            "error",
            "image",
            "mitre attack",
            "network info",
            "performs dns",
            "urls",
            "t1055 process",
            "overview",
            "processes extra",
            "overview zenbox",
            "verdict",
            "phishing",
            "next",
            "ip traffic",
            "msft",
            "msft nethandle",
            "net1500000",
            "server",
            "corporation",
            "chaturmohta",
            "orgroutingref",
            "orgabusehandle",
            "microsoft abuse",
            "orgabuseref",
            "microsoft",
            "orgid",
            "msft address",
            "microsoft way",
            "city",
            "stateprov",
            "postalcode",
            "thumbprint"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775792988&Signature=M1J9CaQkigeg5YRUts8g89wpgmwVxVFRSm9L7fFYPqBizkGksAY%2BQXAESjDzcmPanQSRoqOJXy9yNcu%2F4pPkcUbFtUg8oheQzdL2ebI2eOElYvDV8Mh1Su0AthuKtQT2eC0LsybOE1tRIZO7gxtwxN1CpF5ZhSdES8HaMIFIPL7xsOgmhx4IrdEtjDVHMSCRHnIPuGzO4aQn%2Bl4mga3fI%2FyYiJoFWyMh3OiTXZi%2FidlmFFy9IZTT",
            "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775793011&Signature=Obu7zDEJiUY4g9RFOhUIFYbnTGp8YMLvwJCCIR8YL6KFoTrbPiqoltMTn%2FJbTCwl%2Bxky0XNZLQJ2Bj5RCjBwsG382Ckn5T596CYG%2Fk%2B%2FZl5rfYfzgjGwaLT5bO0t%2B6nmKGUTqsZuubwpBtp2leCiw6rVYimL8xulbJF30wh5qDBfH4u%2FsGJrRnSd%2BHiu%2B8YWf%2B39QE9Q%2BazzeRFrq7Jt4DDRRC%2FXY2D1GdxmPzPrYkI4c7"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 119,
            "IPv4": 81,
            "FileHash-SHA1": 114,
            "FileHash-SHA256": 543,
            "domain": 122,
            "hostname": 411,
            "URL": 721,
            "CIDR": 3,
            "email": 6
          },
          "indicator_count": 2120,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "9 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d747314a8fc4fa30250fe9",
          "name": "VirusTotal report\n                    for program.exe",
          "description": "<A new tool has been developed by JetBrains that can detect \"unusual processes\" accessing desktop.ini, a folder that is accessed only by Windows Explorer and its associated operating system ( Explorer).> Report date relevance: May 18 2025.",
          "modified": "2026-04-09T07:29:31.205000",
          "created": "2026-04-09T06:29:05.116000",
          "tags": [
            "explorer",
            "maxime thiebaut",
            "files",
            "imageendswith",
            "windows sccm",
            "pe file",
            "drops pe",
            "sample",
            "drops",
            "pe32",
            "intel",
            "ms windows",
            "infects",
            "found",
            "mitre attack",
            "persistence",
            "info",
            "next",
            "windows sandbox",
            "calls clear",
            "users",
            "nothing",
            "registry keys",
            "change",
            "mutexes nothing",
            "parent pid",
            "full path",
            "command line",
            "files c",
            "devicecng c",
            "bit locker hijacked",
            "illegal one drive cross tenant",
            "Esign violation",
            "non secure workflow",
            "wiper",
            "MDMenrollment misuse",
            "broken seal",
            "pdfkit.net DMV",
            "vzwbiz",
            "modified after creation non secure workflow",
            "Docusign exploited by non secure workflow",
            "Human Error/Spyware/Risk+",
            "Abobe Exploited by non secure process",
            "CaRoot Cert Abuse",
            "cryptography unsound"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715909&Signature=gpI0cV%2Bz5SujLXqKc%2FMViiMPztLVAF6Rp00wpW3LF4PyrCqLg7GTlahQtBw0v4rtG0E8HaaDkNRYZ6xPc%2BaCuTHHzf0b8HN0%2BOiY%2B%2Bk4Q5eiI%2BJCJiWefs3vtk9u5bFyGQqM4nzF3u1uk2E8d3TKiy09A5K7YNLjbAsewBUu5mmJZsTeErl3nBhQcKu1stwt1ycd78SLCg8fUl3U7DDaqfd3hJbY98lWj8e6NwMu6VxskCRDdSQsdWj2",
            "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715951&Signature=XmRkiqq6Fjiq21rddntr3oHg%2BIPR1SrVwk6v5ZZ%2FJ4PkIpl7sqX1DjtJMGHoYvndxGmCeSCYQ08LS9hYRAWXupAhPzRcTkFcmq6KY%2FyMoab3l0SDixcrT9tLxB4iEobBJOzX0Fb%2B8QDyAbyjsuoKSMNCQC0CrVZyT7X54GsN93BU0FXiJWIIluOisGnjwoqL3rdMF8%2BPEJgkcUJTOIuIRaX57nsrXAMIv7dbn9BGZFDXH0",
            "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715964&Signature=A%2BPIQBCth46RBnI1rK4wnu%2B0XtyUhEdo1TORDahLnR6yM%2BbI8gLsWpjDTmV8aSDFIcFddcr%2BCs9TqMa65j3jNrLz9NcyZekNiDekQlkYCbMCIiYduRDT9nLy485HDee9RRJ3YSbeqJQSjzOXemRKeyL8rg3ml6WTeCly22CrQPLljCwWWUbsQLYOMqu0OADj%2BKEZv%2B5gVOmJsQIBQugE%2F0xSYw1lKowIs5nlYy9Z0hbFUycO"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "PathWiper",
              "display_name": "PathWiper",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [
            "Government",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 81,
            "URL": 421,
            "hostname": 491,
            "FileHash-MD5": 477,
            "FileHash-SHA1": 298,
            "FileHash-SHA256": 719,
            "IPv4": 177,
            "CVE": 5,
            "email": 12,
            "CIDR": 2
          },
          "indicator_count": 2683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5a8def91087434d1df14b",
          "name": "VirusTotal Windows Sandbox",
          "description": "A security alert has been launched by InQuest Labs R&D at the University of California, San Francisco, to investigate the use of Base64 as an address for web addresses and links on the internet. Jd- 3b5074b1b5d032e5620f69f9f700ff0e\n0e07085e04cc7020652995b536fd99a7\n123402a56d3e6b49eb471ee3bd1ccd0d\n131ae075b4ea025e4cac3262abc1cc51\n16896e98512813240dde29439b9dbabb\n2823dc3a4a78c0e45d279d052945dddf\n28a2c9bd18a11de089ef85a160da29e4\n34974b6437558a9b630f17e562868970\n4aad38bb2ab12dfcf77b45dfcad42801\n54af8c5e2731171ab2e103b55fad6ba0\n6316bde54a7388dd96416355e16bbec6\n7d9ca857e500f919822d02e907fd376c\n7fa57cdb6989cc29c9c6e05c1f98a04d\n843d00145c833145305dfd86a9944d47\n9cea5dc0fe8092f4d251f17e173dab20\nadc58c2ebe33331d81758c4ab4eb2091\nb190d3580b6b75594a7d53e0ab7b075c\nb95fd39f922163b94b40d5b7605fe0c9\nd1352a4605e4f045b6f78681227160ca\nd786947b5d04c6705014803f265cc73f\ne16530d7c64d3654ba93408c8d6aff9a\ne4c8aa0e70185e550a8d64e1408e2ccd\nedfa0ce8dc4638c67a6818cf469dbf3f\nf4ce811849cf8ad158970c1b18a2d457",
          "modified": "2026-04-08T02:06:12.150000",
          "created": "2026-04-08T01:01:18.419000",
          "tags": [
            "sha256",
            "ssdeep",
            "zizqw3g tlsh",
            "csv text",
            "magic csv",
            "magika csv",
            "file size",
            "x32gwm",
            "inquest labs",
            "base64",
            "x2bx2fx38x39",
            "x2bx2fx39wz",
            "writefile",
            "readfile",
            "isbadreadptr",
            "setfilepointer",
            "windows api",
            "inquestpii",
            "loadlibrarya",
            "shellexecutea",
            "getprocaddress",
            "microsoft",
            "msft nethandle",
            "net52",
            "net520000",
            "msft",
            "orgid",
            "msft address",
            "microsoft way",
            "city",
            "stateprov",
            "microsoft abuse",
            "contact orgid",
            "orgdnshandle",
            "orgdnsref",
            "orgabuseref",
            "peering",
            "orgtechhandle",
            "domain name",
            "status",
            "windows sandbox",
            "calls process",
            "id file",
            "magic",
            "trid macbinary",
            "memo file",
            "apollo database",
            "engine",
            "vxd driver",
            "sybase",
            "ip traffic",
            "tls sni",
            "cname",
            "default",
            "cultureneutral",
            "file type",
            "mwdb",
            "bazaar",
            "sha3384",
            "inprocserver32",
            "accept",
            "shutdown",
            "win64",
            "url final",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "confuserex mod",
            "aspirecrypt",
            "detects",
            "reactor",
            "beds protector",
            "ps2exe",
            "bsjb",
            "boxedapp",
            "cyaxsharp",
            "cyaxpng",
            "smartassembly",
            "koivm",
            "confuserex",
            "obfuscator",
            "aspack",
            "titan",
            "enigma",
            "vmprotect",
            "strings",
            "rlpack",
            "antiem",
            "antisb",
            "themida",
            "loader",
            "sality",
            "dnguard",
            "shell folders",
            "parent pid",
            "full path",
            "command line",
            "guard",
            "pe file",
            "binary",
            "contains",
            "aslr",
            "https",
            "performs dns",
            "network info",
            "sample",
            "creates",
            "window",
            "malicious",
            "next",
            "systemroot",
            "folders",
            "k netsvcs",
            "file execution",
            "matches rule",
            "snort",
            "get https",
            "medium",
            "info",
            "mtu denial",
            "needed",
            "df bit",
            "unique rule",
            "http requests",
            "memory pattern",
            "post https",
            "dns resolutions",
            "domains",
            "urls https",
            "externalnet",
            "homenet",
            "5762",
            "imageendswith",
            "dns query",
            "browser",
            "nextron",
            "advanced threat",
            "imagestartswith",
            "filesseamonkey",
            "whale",
            "fileswaterfox",
            "filesfalkon"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/657ade511221cda6d5391d6801efbf5857e91e8439319fd70d2a54d02e2697a0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609236&Signature=DeA5O6CTtdDaFLThPBzSDLEN8Osrr52D6l5yCN5bZX5zQjnkvPK3g8QEnK%2FQOZcS6WBDjtPuqSaEsLVXQ652jk0DLtUdQ5x5Tf2QcLEaJo7eeqC27bFTZBED9cwgsbA8rGtb83msJKgxRV6v%2BNcAuehnhhx%2FdluCJQ6wWIHjkCXiGm1h%2FLoJ3zG4VpMtpfFT8yIsc9ooKxbljJx3b7%2BcwgUCUJh%2FTzgrDOFT%2Bk3Oow",
            "https://vtbehaviour.commondatastorage.googleapis.com/05c0d5df13db7952792ccf35fff2eeea88fd0303e166d5e86285359e5d82163a_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609315&Signature=yID4RduHstM4TRFgmJkPYWfFKEByIyDLVxqxQ4J14L5K%2BPR97Pv9y1EWBhQufdvpTr0Vw69MuXZ7pf6mOhKl%2FZ%2Fd7RkVb8psB0SGRdPOqnNQ8zHDZ%2Bb3EAFlIMTeOT6%2BkM8bZF0v9FOpDPYCVS7qWNIOJqed2CkyLMa3MhOf%2Ba4FV%2BW7nDVf3rWt238pP%2F2wOxHtU6%2F0FTIUjozqyUoW5fF9ePLN5a8CrGmacl",
            "https://vtbehaviour.commondatastorage.googleapis.com/7b8931f02a86e3c8becd373d08f6a277b1a2d981d0e4d27b341ae56c84bbcd84_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609482&Signature=Io2DgedeXtCfGstTsFSe2TeudaAytkQ3s377BiOyuabRYdRFEUNDBJMGwe0YqA7y4VOpzZBHyl7MbW9%2Bv3C%2BNucxzMbLEBfJtWBO1IqfvlvMqc32cZjqBOtqB1%2B0aTuaucgzSAVc8PC3VvUbZUaFDBFixJjmgzZMxUb6JRGYyAsHHx0k2GvsYa6oL6L38%2Btsk9f7NIov%2F8IxY1Ha%2FRGmaFNnJ61v2jUOsCDihyPELjLRsTui1b",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609722&Signature=WqkdQY8Bmk%2FkZQxgUlRTtxsUV9ifQ20npBPZi66iZhBFkMlTDlpYVSWs8O3Z3cx%2F5o74iHvujaLyqwtmi%2Bomlrw%2BltLOsTWdLJh%2B3qsX8nB2k%2BDK5%2BZRweROecgBuzTre64tr%2FZhora9m8KiyVewHoBS5vT5lew%2FEcps4pYFdDjGDRv4Hxw00%2FUmsEtMCWRSsp8RRd0LM5%2BDSjY3jsbRfPAjcOFfKoStNFYYDPOs",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609756&Signature=Rdmc7zdC8WIeE5au2ytaKCAZzS6CnYteTrJC0XEqLRR%2FmH9EjX7HJojbe74TjvW3GvkxbLs1vG04awZwb0YXxg9D8%2BQ2HRyO5ErFRMIL9LwZLJmqsZ9NIFf7AFbVlyB2%2B6lH0z552NSsdy3n5rXeD8TLXab9D9LGTyXkPBbp%2BOjDpMBmSOYfVgAyJT17UtY7vLGxQ%2FCJsYWEMAAinVDm%2F%2FvT5z%2BIBaROQDm6CRIRomamw57lq08hFK",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609812&Signature=j%2BmIrkE%2FbH3FNOHyPF0nlsfnFg%2ByHY%2BzIz6oRfDLCGpEPHs4OG%2FiJf5b61rVbsm57qg4xdjsEr4Stv5tGDBKP5OWIT91qaKtVPC2Cqzzv8o6rctKzNZ0zoWD6xMo3PIi3u9ytawP%2Bg2Ub5pJsF2wzyldWroo0FNDHB0Y3xGtAefZxqwSzZQufb9Kn2%2Fy30S9zoWhQXrFWTFr%2FvrszmwbK%2FXSDq2S8HdeXnWpWP",
            "https://vtbehaviour.commondatastorage.googleapis.com/ea342c4f84120e6a5dfab371f971d4763834a7e306b00c72afc76d8e26783b20_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609844&Signature=fB7RV8R%2ByVZoiNavtDWQxujcWbqBpR4b5Br4Brs2E2aI%2FR7C6RW2zPdwquB%2FowTDpVFDUkH%2BAzXgsMaTruvatv4qQrjkyqlZxzqogbWxIuVy2X7HVdc%2B5QIi4AiR74Pm8XyuWufmtmILOJKq9JFgYYXfjZSHojqZoN6GDU%2BRxBF%2FMNvfjaapTTJooQB2elVP0DQpD2v1SxCl%2FNQDPTaybrYD5fBMcOnNoQ0KvurH%2BDI6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 197,
            "FileHash-SHA1": 135,
            "FileHash-SHA256": 186,
            "URL": 192,
            "YARA": 55,
            "hostname": 259,
            "domain": 57,
            "CIDR": 5,
            "email": 9,
            "IPv4": 221
          },
          "indicator_count": 1316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "11 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5a8ed39cff9923a6487f7",
          "name": "VirusTotal Windows Sandbox",
          "description": "A security alert has been launched by InQuest Labs R&D at the University of California, San Francisco, to investigate the use of Base64 as an address for web addresses and links on the internet. Jd- 3b5074b1b5d032e5620f69f9f700ff0e\n0e07085e04cc7020652995b536fd99a7\n123402a56d3e6b49eb471ee3bd1ccd0d\n131ae075b4ea025e4cac3262abc1cc51\n16896e98512813240dde29439b9dbabb\n2823dc3a4a78c0e45d279d052945dddf\n28a2c9bd18a11de089ef85a160da29e4\n34974b6437558a9b630f17e562868970\n4aad38bb2ab12dfcf77b45dfcad42801\n54af8c5e2731171ab2e103b55fad6ba0\n6316bde54a7388dd96416355e16bbec6\n7d9ca857e500f919822d02e907fd376c\n7fa57cdb6989cc29c9c6e05c1f98a04d\n843d00145c833145305dfd86a9944d47\n9cea5dc0fe8092f4d251f17e173dab20\nadc58c2ebe33331d81758c4ab4eb2091\nb190d3580b6b75594a7d53e0ab7b075c\nb95fd39f922163b94b40d5b7605fe0c9\nd1352a4605e4f045b6f78681227160ca\nd786947b5d04c6705014803f265cc73f\ne16530d7c64d3654ba93408c8d6aff9a\ne4c8aa0e70185e550a8d64e1408e2ccd\nedfa0ce8dc4638c67a6818cf469dbf3f\nf4ce811849cf8ad158970c1b18a2d457",
          "modified": "2026-04-08T01:47:03.801000",
          "created": "2026-04-08T01:01:33.948000",
          "tags": [
            "sha256",
            "ssdeep",
            "zizqw3g tlsh",
            "csv text",
            "magic csv",
            "magika csv",
            "file size",
            "x32gwm",
            "inquest labs",
            "base64",
            "x2bx2fx38x39",
            "x2bx2fx39wz",
            "writefile",
            "readfile",
            "isbadreadptr",
            "setfilepointer",
            "windows api",
            "inquestpii",
            "loadlibrarya",
            "shellexecutea",
            "getprocaddress",
            "microsoft",
            "msft nethandle",
            "net52",
            "net520000",
            "msft",
            "orgid",
            "msft address",
            "microsoft way",
            "city",
            "stateprov",
            "microsoft abuse",
            "contact orgid",
            "orgdnshandle",
            "orgdnsref",
            "orgabuseref",
            "peering",
            "orgtechhandle",
            "domain name",
            "status",
            "windows sandbox",
            "calls process",
            "id file",
            "magic",
            "trid macbinary",
            "memo file",
            "apollo database",
            "engine",
            "vxd driver",
            "sybase",
            "ip traffic",
            "tls sni",
            "cname",
            "default",
            "cultureneutral",
            "file type",
            "mwdb",
            "bazaar",
            "sha3384",
            "inprocserver32",
            "accept",
            "shutdown",
            "win64",
            "url final",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "confuserex mod",
            "aspirecrypt",
            "detects",
            "reactor",
            "beds protector",
            "ps2exe",
            "bsjb",
            "boxedapp",
            "cyaxsharp",
            "cyaxpng",
            "smartassembly",
            "koivm",
            "confuserex",
            "obfuscator",
            "aspack",
            "titan",
            "enigma",
            "vmprotect",
            "strings",
            "rlpack",
            "antiem",
            "antisb",
            "themida",
            "loader",
            "sality",
            "dnguard",
            "shell folders",
            "parent pid",
            "full path",
            "command line",
            "guard",
            "pe file",
            "binary",
            "contains",
            "aslr",
            "https",
            "performs dns",
            "network info",
            "sample",
            "creates",
            "window",
            "malicious",
            "next",
            "systemroot",
            "folders",
            "k netsvcs",
            "file execution",
            "matches rule",
            "snort",
            "get https",
            "medium",
            "info",
            "mtu denial",
            "needed",
            "df bit",
            "unique rule",
            "http requests",
            "memory pattern",
            "post https",
            "dns resolutions",
            "domains",
            "urls https",
            "externalnet",
            "homenet",
            "5762",
            "imageendswith",
            "dns query",
            "browser",
            "nextron",
            "advanced threat",
            "imagestartswith",
            "filesseamonkey",
            "whale",
            "fileswaterfox",
            "filesfalkon"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/657ade511221cda6d5391d6801efbf5857e91e8439319fd70d2a54d02e2697a0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609236&Signature=DeA5O6CTtdDaFLThPBzSDLEN8Osrr52D6l5yCN5bZX5zQjnkvPK3g8QEnK%2FQOZcS6WBDjtPuqSaEsLVXQ652jk0DLtUdQ5x5Tf2QcLEaJo7eeqC27bFTZBED9cwgsbA8rGtb83msJKgxRV6v%2BNcAuehnhhx%2FdluCJQ6wWIHjkCXiGm1h%2FLoJ3zG4VpMtpfFT8yIsc9ooKxbljJx3b7%2BcwgUCUJh%2FTzgrDOFT%2Bk3Oow",
            "https://vtbehaviour.commondatastorage.googleapis.com/05c0d5df13db7952792ccf35fff2eeea88fd0303e166d5e86285359e5d82163a_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609315&Signature=yID4RduHstM4TRFgmJkPYWfFKEByIyDLVxqxQ4J14L5K%2BPR97Pv9y1EWBhQufdvpTr0Vw69MuXZ7pf6mOhKl%2FZ%2Fd7RkVb8psB0SGRdPOqnNQ8zHDZ%2Bb3EAFlIMTeOT6%2BkM8bZF0v9FOpDPYCVS7qWNIOJqed2CkyLMa3MhOf%2Ba4FV%2BW7nDVf3rWt238pP%2F2wOxHtU6%2F0FTIUjozqyUoW5fF9ePLN5a8CrGmacl",
            "https://vtbehaviour.commondatastorage.googleapis.com/7b8931f02a86e3c8becd373d08f6a277b1a2d981d0e4d27b341ae56c84bbcd84_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609482&Signature=Io2DgedeXtCfGstTsFSe2TeudaAytkQ3s377BiOyuabRYdRFEUNDBJMGwe0YqA7y4VOpzZBHyl7MbW9%2Bv3C%2BNucxzMbLEBfJtWBO1IqfvlvMqc32cZjqBOtqB1%2B0aTuaucgzSAVc8PC3VvUbZUaFDBFixJjmgzZMxUb6JRGYyAsHHx0k2GvsYa6oL6L38%2Btsk9f7NIov%2F8IxY1Ha%2FRGmaFNnJ61v2jUOsCDihyPELjLRsTui1b",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609722&Signature=WqkdQY8Bmk%2FkZQxgUlRTtxsUV9ifQ20npBPZi66iZhBFkMlTDlpYVSWs8O3Z3cx%2F5o74iHvujaLyqwtmi%2Bomlrw%2BltLOsTWdLJh%2B3qsX8nB2k%2BDK5%2BZRweROecgBuzTre64tr%2FZhora9m8KiyVewHoBS5vT5lew%2FEcps4pYFdDjGDRv4Hxw00%2FUmsEtMCWRSsp8RRd0LM5%2BDSjY3jsbRfPAjcOFfKoStNFYYDPOs",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609756&Signature=Rdmc7zdC8WIeE5au2ytaKCAZzS6CnYteTrJC0XEqLRR%2FmH9EjX7HJojbe74TjvW3GvkxbLs1vG04awZwb0YXxg9D8%2BQ2HRyO5ErFRMIL9LwZLJmqsZ9NIFf7AFbVlyB2%2B6lH0z552NSsdy3n5rXeD8TLXab9D9LGTyXkPBbp%2BOjDpMBmSOYfVgAyJT17UtY7vLGxQ%2FCJsYWEMAAinVDm%2F%2FvT5z%2BIBaROQDm6CRIRomamw57lq08hFK",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609812&Signature=j%2BmIrkE%2FbH3FNOHyPF0nlsfnFg%2ByHY%2BzIz6oRfDLCGpEPHs4OG%2FiJf5b61rVbsm57qg4xdjsEr4Stv5tGDBKP5OWIT91qaKtVPC2Cqzzv8o6rctKzNZ0zoWD6xMo3PIi3u9ytawP%2Bg2Ub5pJsF2wzyldWroo0FNDHB0Y3xGtAefZxqwSzZQufb9Kn2%2Fy30S9zoWhQXrFWTFr%2FvrszmwbK%2FXSDq2S8HdeXnWpWP",
            "https://vtbehaviour.commondatastorage.googleapis.com/ea342c4f84120e6a5dfab371f971d4763834a7e306b00c72afc76d8e26783b20_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609844&Signature=fB7RV8R%2ByVZoiNavtDWQxujcWbqBpR4b5Br4Brs2E2aI%2FR7C6RW2zPdwquB%2FowTDpVFDUkH%2BAzXgsMaTruvatv4qQrjkyqlZxzqogbWxIuVy2X7HVdc%2B5QIi4AiR74Pm8XyuWufmtmILOJKq9JFgYYXfjZSHojqZoN6GDU%2BRxBF%2FMNvfjaapTTJooQB2elVP0DQpD2v1SxCl%2FNQDPTaybrYD5fBMcOnNoQ0KvurH%2BDI6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 77,
            "FileHash-SHA1": 51,
            "FileHash-SHA256": 100,
            "URL": 144,
            "YARA": 55,
            "hostname": 183,
            "domain": 43,
            "CIDR": 5,
            "email": 7,
            "IPv4": 149
          },
          "indicator_count": 814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "11 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5a8e09ff941be26eaec9c",
          "name": "VirusTotal Windows Sandbox",
          "description": "A security alert has been launched by InQuest Labs R&D at the University of California, San Francisco, to investigate the use of Base64 as an address for web addresses and links on the internet. Jd- 3b5074b1b5d032e5620f69f9f700ff0e\n0e07085e04cc7020652995b536fd99a7\n123402a56d3e6b49eb471ee3bd1ccd0d\n131ae075b4ea025e4cac3262abc1cc51\n16896e98512813240dde29439b9dbabb\n2823dc3a4a78c0e45d279d052945dddf\n28a2c9bd18a11de089ef85a160da29e4\n34974b6437558a9b630f17e562868970\n4aad38bb2ab12dfcf77b45dfcad42801\n54af8c5e2731171ab2e103b55fad6ba0\n6316bde54a7388dd96416355e16bbec6\n7d9ca857e500f919822d02e907fd376c\n7fa57cdb6989cc29c9c6e05c1f98a04d\n843d00145c833145305dfd86a9944d47\n9cea5dc0fe8092f4d251f17e173dab20\nadc58c2ebe33331d81758c4ab4eb2091\nb190d3580b6b75594a7d53e0ab7b075c\nb95fd39f922163b94b40d5b7605fe0c9\nd1352a4605e4f045b6f78681227160ca\nd786947b5d04c6705014803f265cc73f\ne16530d7c64d3654ba93408c8d6aff9a\ne4c8aa0e70185e550a8d64e1408e2ccd\nedfa0ce8dc4638c67a6818cf469dbf3f\nf4ce811849cf8ad158970c1b18a2d457",
          "modified": "2026-04-08T01:47:02.694000",
          "created": "2026-04-08T01:01:20.099000",
          "tags": [
            "sha256",
            "ssdeep",
            "zizqw3g tlsh",
            "csv text",
            "magic csv",
            "magika csv",
            "file size",
            "x32gwm",
            "inquest labs",
            "base64",
            "x2bx2fx38x39",
            "x2bx2fx39wz",
            "writefile",
            "readfile",
            "isbadreadptr",
            "setfilepointer",
            "windows api",
            "inquestpii",
            "loadlibrarya",
            "shellexecutea",
            "getprocaddress",
            "microsoft",
            "msft nethandle",
            "net52",
            "net520000",
            "msft",
            "orgid",
            "msft address",
            "microsoft way",
            "city",
            "stateprov",
            "microsoft abuse",
            "contact orgid",
            "orgdnshandle",
            "orgdnsref",
            "orgabuseref",
            "peering",
            "orgtechhandle",
            "domain name",
            "status",
            "windows sandbox",
            "calls process",
            "id file",
            "magic",
            "trid macbinary",
            "memo file",
            "apollo database",
            "engine",
            "vxd driver",
            "sybase",
            "ip traffic",
            "tls sni",
            "cname",
            "default",
            "cultureneutral",
            "file type",
            "mwdb",
            "bazaar",
            "sha3384",
            "inprocserver32",
            "accept",
            "shutdown",
            "win64",
            "url final",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "confuserex mod",
            "aspirecrypt",
            "detects",
            "reactor",
            "beds protector",
            "ps2exe",
            "bsjb",
            "boxedapp",
            "cyaxsharp",
            "cyaxpng",
            "smartassembly",
            "koivm",
            "confuserex",
            "obfuscator",
            "aspack",
            "titan",
            "enigma",
            "vmprotect",
            "strings",
            "rlpack",
            "antiem",
            "antisb",
            "themida",
            "loader",
            "sality",
            "dnguard",
            "shell folders",
            "parent pid",
            "full path",
            "command line",
            "guard",
            "pe file",
            "binary",
            "contains",
            "aslr",
            "https",
            "performs dns",
            "network info",
            "sample",
            "creates",
            "window",
            "malicious",
            "next",
            "systemroot",
            "folders",
            "k netsvcs",
            "file execution",
            "matches rule",
            "snort",
            "get https",
            "medium",
            "info",
            "mtu denial",
            "needed",
            "df bit",
            "unique rule",
            "http requests",
            "memory pattern",
            "post https",
            "dns resolutions",
            "domains",
            "urls https",
            "externalnet",
            "homenet",
            "5762",
            "imageendswith",
            "dns query",
            "browser",
            "nextron",
            "advanced threat",
            "imagestartswith",
            "filesseamonkey",
            "whale",
            "fileswaterfox",
            "filesfalkon"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/657ade511221cda6d5391d6801efbf5857e91e8439319fd70d2a54d02e2697a0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609236&Signature=DeA5O6CTtdDaFLThPBzSDLEN8Osrr52D6l5yCN5bZX5zQjnkvPK3g8QEnK%2FQOZcS6WBDjtPuqSaEsLVXQ652jk0DLtUdQ5x5Tf2QcLEaJo7eeqC27bFTZBED9cwgsbA8rGtb83msJKgxRV6v%2BNcAuehnhhx%2FdluCJQ6wWIHjkCXiGm1h%2FLoJ3zG4VpMtpfFT8yIsc9ooKxbljJx3b7%2BcwgUCUJh%2FTzgrDOFT%2Bk3Oow",
            "https://vtbehaviour.commondatastorage.googleapis.com/05c0d5df13db7952792ccf35fff2eeea88fd0303e166d5e86285359e5d82163a_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609315&Signature=yID4RduHstM4TRFgmJkPYWfFKEByIyDLVxqxQ4J14L5K%2BPR97Pv9y1EWBhQufdvpTr0Vw69MuXZ7pf6mOhKl%2FZ%2Fd7RkVb8psB0SGRdPOqnNQ8zHDZ%2Bb3EAFlIMTeOT6%2BkM8bZF0v9FOpDPYCVS7qWNIOJqed2CkyLMa3MhOf%2Ba4FV%2BW7nDVf3rWt238pP%2F2wOxHtU6%2F0FTIUjozqyUoW5fF9ePLN5a8CrGmacl",
            "https://vtbehaviour.commondatastorage.googleapis.com/7b8931f02a86e3c8becd373d08f6a277b1a2d981d0e4d27b341ae56c84bbcd84_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609482&Signature=Io2DgedeXtCfGstTsFSe2TeudaAytkQ3s377BiOyuabRYdRFEUNDBJMGwe0YqA7y4VOpzZBHyl7MbW9%2Bv3C%2BNucxzMbLEBfJtWBO1IqfvlvMqc32cZjqBOtqB1%2B0aTuaucgzSAVc8PC3VvUbZUaFDBFixJjmgzZMxUb6JRGYyAsHHx0k2GvsYa6oL6L38%2Btsk9f7NIov%2F8IxY1Ha%2FRGmaFNnJ61v2jUOsCDihyPELjLRsTui1b",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609722&Signature=WqkdQY8Bmk%2FkZQxgUlRTtxsUV9ifQ20npBPZi66iZhBFkMlTDlpYVSWs8O3Z3cx%2F5o74iHvujaLyqwtmi%2Bomlrw%2BltLOsTWdLJh%2B3qsX8nB2k%2BDK5%2BZRweROecgBuzTre64tr%2FZhora9m8KiyVewHoBS5vT5lew%2FEcps4pYFdDjGDRv4Hxw00%2FUmsEtMCWRSsp8RRd0LM5%2BDSjY3jsbRfPAjcOFfKoStNFYYDPOs",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609756&Signature=Rdmc7zdC8WIeE5au2ytaKCAZzS6CnYteTrJC0XEqLRR%2FmH9EjX7HJojbe74TjvW3GvkxbLs1vG04awZwb0YXxg9D8%2BQ2HRyO5ErFRMIL9LwZLJmqsZ9NIFf7AFbVlyB2%2B6lH0z552NSsdy3n5rXeD8TLXab9D9LGTyXkPBbp%2BOjDpMBmSOYfVgAyJT17UtY7vLGxQ%2FCJsYWEMAAinVDm%2F%2FvT5z%2BIBaROQDm6CRIRomamw57lq08hFK",
            "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609812&Signature=j%2BmIrkE%2FbH3FNOHyPF0nlsfnFg%2ByHY%2BzIz6oRfDLCGpEPHs4OG%2FiJf5b61rVbsm57qg4xdjsEr4Stv5tGDBKP5OWIT91qaKtVPC2Cqzzv8o6rctKzNZ0zoWD6xMo3PIi3u9ytawP%2Bg2Ub5pJsF2wzyldWroo0FNDHB0Y3xGtAefZxqwSzZQufb9Kn2%2Fy30S9zoWhQXrFWTFr%2FvrszmwbK%2FXSDq2S8HdeXnWpWP",
            "https://vtbehaviour.commondatastorage.googleapis.com/ea342c4f84120e6a5dfab371f971d4763834a7e306b00c72afc76d8e26783b20_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609844&Signature=fB7RV8R%2ByVZoiNavtDWQxujcWbqBpR4b5Br4Brs2E2aI%2FR7C6RW2zPdwquB%2FowTDpVFDUkH%2BAzXgsMaTruvatv4qQrjkyqlZxzqogbWxIuVy2X7HVdc%2B5QIi4AiR74Pm8XyuWufmtmILOJKq9JFgYYXfjZSHojqZoN6GDU%2BRxBF%2FMNvfjaapTTJooQB2elVP0DQpD2v1SxCl%2FNQDPTaybrYD5fBMcOnNoQ0KvurH%2BDI6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 77,
            "FileHash-SHA1": 51,
            "FileHash-SHA256": 100,
            "URL": 144,
            "YARA": 55,
            "hostname": 183,
            "domain": 43,
            "CIDR": 5,
            "email": 7,
            "IPv4": 149
          },
          "indicator_count": 814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "11 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c40496b927d4374c5ce278",
          "name": "Nissan Data",
          "description": "Victims C2 car console repeated failure notices.",
          "modified": "2026-03-25T16:10:15.454000",
          "created": "2026-03-25T15:51:50.778000",
          "tags": [
            "cachecontrol",
            "keepalive",
            "connection",
            "date thu",
            "gmt xversion",
            "etag",
            "link",
            "ip address",
            "status code",
            "control",
            "date wed",
            "get http",
            "dns resolutions",
            "ip traffic",
            "number",
            "cnmicrosoft ecc",
            "update secure",
            "server ca",
            "cus subject",
            "stwa lredmond",
            "omicrosoft c",
            "user",
            "data",
            "datacrashpad",
            "edge"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 21,
            "domain": 37,
            "URL": 637,
            "hostname": 236,
            "FileHash-SHA256": 34,
            "IPv4": 12,
            "FileHash-SHA1": 9,
            "CIDR": 3,
            "email": 24
          },
          "indicator_count": 1013,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "25 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69acb8f6cce1f91525fde375",
          "name": "microsoftstore.jo3.org",
          "description": "Detected a widespread Social Engineering campaign (ClearFake/ClickFix) utilizing a specific naming convention for Command and Control (C2) infrastructure. The campaign targets users via compromised WordPress sites, presenting a fake \"reCAPTCHA\" or \"Browser Update\" lure.\nThe lure tricks users into executing a PowerShell command (ClickFix), which delivers an info-stealer (likely Lumma or Vidar). Data exfiltration is occurring via DNS Tunneling through randomized subdomains.\nKey Observation: The attacker is using nature-themed and residential-themed domain names registered under the .in.net TLD to blend in with legitimate suburban/residential web traffic.-msudosos",
          "modified": "2026-03-08T02:49:11.676000",
          "created": "2026-03-07T23:47:02.083000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 35,
            "domain": 6,
            "CIDR": 4,
            "URL": 45,
            "email": 32
          },
          "indicator_count": 122,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "42 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c5970817e6bf8b0e5b5ff",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:48.087000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 339,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6558126013aef7ce80968842",
          "name": "PuffStealer",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-18T01:24:48.887000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c5970817e6bf8b0e5b5ff",
          "export_count": 334,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29ff31857aafba0358e1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T18:50:39.675000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c597a4a45c8d84f0b15c1",
          "export_count": 341,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c606d74f82e547c77ad89",
          "name": "Ransom.Win64.PORNOASSET.SM1 | DeepScan:Generic.Ransom.GandCrab5",
          "description": "Ransom.Win64.PORNOASSET.SM1 DeepScan:Generic.Ransom.GandCrab5\nBlackNET RAT $WebWatson\nAuto generated results from a variety of tools.",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:30:37.089000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c597a4a45c8d84f0b15c1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:58.166000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "This document might expose someone, more than another.",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "Maltiverse Research Team",
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "IPv4 104.247.81.51             command_and_control",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775792988&Signature=M1J9CaQkigeg5YRUts8g89wpgmwVxVFRSm9L7fFYPqBizkGksAY%2BQXAESjDzcmPanQSRoqOJXy9yNcu%2F4pPkcUbFtUg8oheQzdL2ebI2eOElYvDV8Mh1Su0AthuKtQT2eC0LsybOE1tRIZO7gxtwxN1CpF5ZhSdES8HaMIFIPL7xsOgmhx4IrdEtjDVHMSCRHnIPuGzO4aQn%2Bl4mga3fI%2FyYiJoFWyMh3OiTXZi%2FidlmFFy9IZTT",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "France",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609722&Signature=WqkdQY8Bmk%2FkZQxgUlRTtxsUV9ifQ20npBPZi66iZhBFkMlTDlpYVSWs8O3Z3cx%2F5o74iHvujaLyqwtmi%2Bomlrw%2BltLOsTWdLJh%2B3qsX8nB2k%2BDK5%2BZRweROecgBuzTre64tr%2FZhora9m8KiyVewHoBS5vT5lew%2FEcps4pYFdDjGDRv4Hxw00%2FUmsEtMCWRSsp8RRd0LM5%2BDSjY3jsbRfPAjcOFfKoStNFYYDPOs",
        "IPv4 95.213.186.51              command_and_control",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609756&Signature=Rdmc7zdC8WIeE5au2ytaKCAZzS6CnYteTrJC0XEqLRR%2FmH9EjX7HJojbe74TjvW3GvkxbLs1vG04awZwb0YXxg9D8%2BQ2HRyO5ErFRMIL9LwZLJmqsZ9NIFf7AFbVlyB2%2B6lH0z552NSsdy3n5rXeD8TLXab9D9LGTyXkPBbp%2BOjDpMBmSOYfVgAyJT17UtY7vLGxQ%2FCJsYWEMAAinVDm%2F%2FvT5z%2BIBaROQDm6CRIRomamw57lq08hFK",
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "URLhaus Abuse.ch",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "IPv4 103.224.182.246        command_and_control",
        "Gatsby Library Loader, DLL",
        "IPv4 45.15.156.208            command_and_control",
        "https://vtbehaviour.commondatastorage.googleapis.com/7b8931f02a86e3c8becd373d08f6a277b1a2d981d0e4d27b341ae56c84bbcd84_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609482&Signature=Io2DgedeXtCfGstTsFSe2TeudaAytkQ3s377BiOyuabRYdRFEUNDBJMGwe0YqA7y4VOpzZBHyl7MbW9%2Bv3C%2BNucxzMbLEBfJtWBO1IqfvlvMqc32cZjqBOtqB1%2B0aTuaucgzSAVc8PC3VvUbZUaFDBFixJjmgzZMxUb6JRGYyAsHHx0k2GvsYa6oL6L38%2Btsk9f7NIov%2F8IxY1Ha%2FRGmaFNnJ61v2jUOsCDihyPELjLRsTui1b",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715951&Signature=XmRkiqq6Fjiq21rddntr3oHg%2BIPR1SrVwk6v5ZZ%2FJ4PkIpl7sqX1DjtJMGHoYvndxGmCeSCYQ08LS9hYRAWXupAhPzRcTkFcmq6KY%2FyMoab3l0SDixcrT9tLxB4iEobBJOzX0Fb%2B8QDyAbyjsuoKSMNCQC0CrVZyT7X54GsN93BU0FXiJWIIluOisGnjwoqL3rdMF8%2BPEJgkcUJTOIuIRaX57nsrXAMIv7dbn9BGZFDXH0",
        "APKMirror https://www.apkmirror.com",
        "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Y2K",
        "https://vtbehaviour.commondatastorage.googleapis.com/ea342c4f84120e6a5dfab371f971d4763834a7e306b00c72afc76d8e26783b20_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609844&Signature=fB7RV8R%2ByVZoiNavtDWQxujcWbqBpR4b5Br4Brs2E2aI%2FR7C6RW2zPdwquB%2FowTDpVFDUkH%2BAzXgsMaTruvatv4qQrjkyqlZxzqogbWxIuVy2X7HVdc%2B5QIi4AiR74Pm8XyuWufmtmILOJKq9JFgYYXfjZSHojqZoN6GDU%2BRxBF%2FMNvfjaapTTJooQB2elVP0DQpD2v1SxCl%2FNQDPTaybrYD5fBMcOnNoQ0KvurH%2BDI6",
        "Proton.me/Zenbox: Audit July 2025",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "fp2e7a.wpc.2be4.phicdn.net",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "IPv4 45.12.253.72.            command_and_control",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
        "https://downloaddevtools.ir/     (phishing)",
        "URLscan.io",
        "Digi/Global Sign - audit 2020 digital intersect",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609812&Signature=j%2BmIrkE%2FbH3FNOHyPF0nlsfnFg%2ByHY%2BzIz6oRfDLCGpEPHs4OG%2FiJf5b61rVbsm57qg4xdjsEr4Stv5tGDBKP5OWIT91qaKtVPC2Cqzzv8o6rctKzNZ0zoWD6xMo3PIi3u9ytawP%2Bg2Ub5pJsF2wzyldWroo0FNDHB0Y3xGtAefZxqwSzZQufb9Kn2%2Fy30S9zoWhQXrFWTFr%2FvrszmwbK%2FXSDq2S8HdeXnWpWP",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775793011&Signature=Obu7zDEJiUY4g9RFOhUIFYbnTGp8YMLvwJCCIR8YL6KFoTrbPiqoltMTn%2FJbTCwl%2Bxky0XNZLQJ2Bj5RCjBwsG382Ckn5T596CYG%2Fk%2B%2FZl5rfYfzgjGwaLT5bO0t%2B6nmKGUTqsZuubwpBtp2leCiw6rVYimL8xulbJF30wh5qDBfH4u%2FsGJrRnSd%2BHiu%2B8YWf%2B39QE9Q%2BazzeRFrq7Jt4DDRRC%2FXY2D1GdxmPzPrYkI4c7",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "US, Philippines, Ukraine, Iran, China. Alberta.",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "Deep Research",
        "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "https://vtbehaviour.commondatastorage.googleapis.com/05c0d5df13db7952792ccf35fff2eeea88fd0303e166d5e86285359e5d82163a_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609315&Signature=yID4RduHstM4TRFgmJkPYWfFKEByIyDLVxqxQ4J14L5K%2BPR97Pv9y1EWBhQufdvpTr0Vw69MuXZ7pf6mOhKl%2FZ%2Fd7RkVb8psB0SGRdPOqnNQ8zHDZ%2Bb3EAFlIMTeOT6%2BkM8bZF0v9FOpDPYCVS7qWNIOJqed2CkyLMa3MhOf%2Ba4FV%2BW7nDVf3rWt238pP%2F2wOxHtU6%2F0FTIUjozqyUoW5fF9ePLN5a8CrGmacl",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "20.99.186.246 exploit source",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "Cyber Threat Coalition",
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984872&Signature=X7ut04viSpboUfiHbVbGH602vbGaavKO28%2FuQZ9YCLjbW%2Bl9JHGrffH4HHtGQ39GPFGg3uUwyMpuOewArLSuI0W%2F0SjlRr%2B3ob5iUQ8eckXWI47mIElQtuCwRStAGCclC8lI%2BsnrEI7u%2FvPhk16ucrMhQtHiSehYuWwNi1lQkbG3Y5ZoDqClBlw1uSMm1jm1Gpu1EBVSIeAqmbV33HSK%2FDTrwzhuwObiyOu4RKE9E7MOmj%2",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr",
        "init.ess.apple.com         (malicious code script)",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "happylifehappywife.com",
        "Entrust to Sectigo- Review vendors",
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984910&Signature=hjdKVB1Hclv%2FNw7qh%2FV50rCooI70BC8NJcq77KWRUu6VAlxs8vV%2FWfNLh9VzjKS2pBgR7wAaaDp6GwPof61nS4TwykWgUO%2FavR45JKGxhUsjhYKLE5VQoAZkh13wvx1nTVwH%2FP6fx71mJlF71bDqJe7pjpKdd3jyGRDGC6ksN3fMJ%2FRVnusGPDwzZXpy9F6CUYZ1tT9xuK7k3zz9xdIV5e0noQ9s7P343Ca7ROLOUhs9",
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715964&Signature=A%2BPIQBCth46RBnI1rK4wnu%2B0XtyUhEdo1TORDahLnR6yM%2BbI8gLsWpjDTmV8aSDFIcFddcr%2BCs9TqMa65j3jNrLz9NcyZekNiDekQlkYCbMCIiYduRDT9nLy485HDee9RRJ3YSbeqJQSjzOXemRKeyL8rg3ml6WTeCly22CrQPLljCwWWUbsQLYOMqu0OADj%2BKEZv%2B5gVOmJsQIBQugE%2F0xSYw1lKowIs5nlYy9Z0hbFUycO",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "ThreatFox Abuse.ch",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "Hostname: www.supernetforme.com      command_and_control",
        "CA DMV- 2020 exploits, if even exist in your records, may be related.",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "Spellbinding! Indeed. SpellEditor.exe",
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715909&Signature=gpI0cV%2Bz5SujLXqKc%2FMViiMPztLVAF6Rp00wpW3LF4PyrCqLg7GTlahQtBw0v4rtG0E8HaaDkNRYZ6xPc%2BaCuTHHzf0b8HN0%2BOiY%2B%2Bk4Q5eiI%2BJCJiWefs3vtk9u5bFyGQqM4nzF3u1uk2E8d3TKiy09A5K7YNLjbAsewBUu5mmJZsTeErl3nBhQcKu1stwt1ycd78SLCg8fUl3U7DDaqfd3hJbY98lWj8e6NwMu6VxskCRDdSQsdWj2",
        "Amazon- Check new cert subscribers on or around Sept 15 2025",
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "People who exploit this put the US at risk. Bottom line.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
        "IPv4 72.251.233.245           command_and_control",
        "https://vtbehaviour.commondatastorage.googleapis.com/657ade511221cda6d5391d6801efbf5857e91e8439319fd70d2a54d02e2697a0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609236&Signature=DeA5O6CTtdDaFLThPBzSDLEN8Osrr52D6l5yCN5bZX5zQjnkvPK3g8QEnK%2FQOZcS6WBDjtPuqSaEsLVXQ652jk0DLtUdQ5x5Tf2QcLEaJo7eeqC27bFTZBED9cwgsbA8rGtb83msJKgxRV6v%2BNcAuehnhhx%2FdluCJQ6wWIHjkCXiGm1h%2FLoJ3zG4VpMtpfFT8yIsc9ooKxbljJx3b7%2BcwgUCUJh%2FTzgrDOFT%2Bk3Oow",
        "Hybrid Analysis",
        "Micro - Dates to look for specific: April/May/June 2025",
        "Germany, Austria, and Switzerland GmbH",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "IPv4 63.251.106.25             command_and_control",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "Google Docs 1.25.202.02 APK Download by Google LLC",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Lucky Mouse APT27 | NoName057(16) |  Unnamed"
          ],
          "malware_families": [
            "Xlm.trojan.abracadabra.27",
            "Bscope.trojan",
            "Inmortal",
            "Phish.jat",
            "Linux.agent",
            "Generic.asmalws",
            "Suspicious_gen.f47v0520",
            "Riskware.hacktool.agent",
            "Dangerousobject.multi",
            "Malicious.high.ml",
            "Trojan:vba/downldr",
            "Bladabindi.q",
            "Trojan.agent",
            "Malicious.moderate.ml",
            "Constructor.msil  linux.agent",
            "Suspicious.save",
            "Application.searchprotect",
            "Downloader.certutilurlcache",
            "Staticrr.paleokits.net",
            "W32.aidetectvm",
            "Heur/qvm42.3.72eb.malware",
            "Deepscan:generic.spyagent.6",
            "Trojan.trickster",
            "Nemucod.a",
            "Scrinject.b",
            "Trojan.js.agent",
            "Virus.ramnit",
            "Vb.chronos.7",
            "Cil.heapoverride",
            "Backdoor.agent",
            "Trojan:msil/burkina",
            "Gamehack.crs",
            "Adload.ad81",
            "Trojan.ekstak",
            "Vb.pwshell.2",
            "Backdoor.rbot",
            "Dropper.msil",
            "Gen:heur.msil.androm",
            "Xegumumune.8596c22f",
            "Constructor.msil",
            "Deepscan:generic.ransom.gandcrab5",
            "Trickbot - s0266",
            "Auslogics",
            "Generic.servstart.a",
            "Kryptik.nrd",
            "Vba.downloader",
            "Trojan.generic",
            "Trojanspy.java",
            "Application.innovativsol",
            "Gen:variant.midie",
            "Generic.malware",
            "Generic.msil.limerat",
            "Trojan.tasker",
            "Worm.win64.autorun",
            "Agent.aik.gencil.stupidcryptor",
            "Riskware",
            "Heur:trojan.msoffice.stratos",
            "Evo",
            "Trojan.packednet",
            "Behavbehaveslike.pupxbi",
            "Riskware.agent",
            "Blacknet",
            "Trojan.chapak",
            "Vb.emodldr.4",
            "Redcap.zoohz",
            "Heur:trojan.tasker",
            "Macro.agent",
            "Black.gen2",
            "Python.keylogger",
            "Gen:variant.zusy",
            "Heur.bzc.yax.pantera.10",
            "Gen:nn.zemsilf.34062",
            "Trojan.ransom.generickd",
            "Azorult",
            "Program.unwanted",
            "Redcap.rlhse",
            "Trojan.pws.agent",
            "Cil.stupidcryptor",
            "Psw.stealer",
            "Agen.1030939",
            "Vb.emooodldr.10",
            "Skynet",
            "W32.eheur",
            "Vb.downloader.2",
            "Html_redir.smr",
            "Deepscan:generic.ransom.amnesiae",
            "Gen:variant.bulz",
            "Gamehack.dom",
            "Malicious.8c45ba",
            "Trojan.pws.growtopia",
            "Ramnit.n",
            "Injector.clds",
            "Gen:heur.noobyprotect",
            "Gen:trojan.heur2.lptbhw@w64.hfsautob",
            "Dridex",
            "Trojan.downloader.generic",
            "Webmonitor rat",
            "Js:trojan.clicker",
            "Trojan.heur",
            "Redcap.vneda",
            "Behaveslike.ransom",
            "Heur.msword.gen",
            "Suspicious.low.ml",
            "Exploit.cve",
            "Troj_gen.r002c0og518",
            "Pws-fczz",
            "Gen:variant.ulise",
            "Generic.trickbot.1",
            "Gen:variant.johnnie",
            "Gen:heur.ransom.hiddentears",
            "Heur:backdoor.msil.nanobot",
            "Trojan.malware.121218",
            "Blacknet rat",
            "Pws.p",
            "Trojan.notifier",
            "Trojan.inject",
            "Agenttesla",
            "Hack.patcher",
            "Trojan.indiloadz",
            "Trojan.killproc",
            "Script.agent",
            "Generic.malware.smyb",
            "Gen:variant.razy",
            "Ml.generic",
            "Riskware.netfilter",
            "Trojan:linux/downldr",
            "Backdoor.hupigon",
            "Loki password stealer (pws)",
            "Trojan.php.agent",
            "Phish.ab",
            "Unsafe.ai_score_100%",
            "Psw.agent",
            "Injector.jdo",
            "Virus.office.qexvmc",
            "Trojan.wisdomeyes.16070401.9500",
            "Ransom:win32/cve-2017-0147",
            "Gen:variant.symmi",
            "Backdoor.androm",
            "Suspected of trojan.downloader.gen",
            "Malicious.3e78cc",
            "Cve-2015-1650",
            "Heur:trojan.msoffice.sagent",
            "Trojan.msil",
            "Macro.downloader.amip",
            "Psw.discord",
            "Dropper.binder",
            "Apt notes",
            "Spyware.bobik",
            "Immortal stealer",
            "Hoax.js.phish",
            "Kryptik.fph.gen",
            "Powershell.downloader",
            "Backdoor.poison",
            "Trojan.wanna",
            "Artemis",
            "Virus.virut",
            "Redline stealer",
            "Autoit.bimwt",
            "Exploit cve-2017-11882",
            "Unsafe",
            "Msil.trojan.bse",
            "Gen:variant.kazy",
            "Trojan.starter js.iframe",
            "Agent.ypez",
            "Riskware.crack",
            "Ait.heur.cottonmouth.8.78f19bd7",
            "Trojan.trickbot",
            "Powershell.trojan",
            "Agen.1043164",
            "Trojan.vbkryjetor",
            "Gen:variant.ser.strictor",
            "W32.aidetect",
            "Agen.1144657",
            "Dropper.trojan.agent",
            "Ransom.win64.pornoasset.sm1",
            "Js:trojan.js.faceliker",
            "Heur.vba.trojan",
            "Ransom.wannacrypt",
            "Gen:variant.sirefef",
            "Trojan.androm.gen",
            "Js:trojan.js.likejack",
            "Trojan.delshad",
            "Gen:nn.zemsilf.34128",
            "Virus.3dmax.script",
            "Js:trojan.hidelink",
            "Gen:variant.msilperseus",
            "Packed.themida.gen",
            "Faceliker.a",
            "Bscope.riskware",
            "Injector.is.gen",
            "Agen.1141126",
            "Malicious.6e0700",
            "Trojan.ole2.vbs",
            "Application.sqlcrack",
            "Adware.installmonetizer",
            "Generic.msil.bladabindi",
            "S-b748adc5",
            "Gen:variant.revengerat",
            "Adware.kuzitui",
            "W32.trojan",
            "Trojandownloader:linux/downldr",
            "Suppobox",
            "Trojan.win64",
            "Wacatac.d6",
            "Index.php",
            "Phishing.html",
            "Agent.pwc",
            "Heur/qvm41.2.da9b.malware",
            "Trojanspy.keylogger",
            "Gen:nn",
            "Il:trojan.msilzilla",
            "Gen:variant.barys",
            "Generic.bitcoinminer.3",
            "Kuluoz.b.gen",
            "Ransom_wcry.smj",
            "Trojan.psw.mimikatz",
            "Domains",
            "Gamehack.nl",
            "Trojan.vba",
            "Generic.msil.passwordstealer",
            "Pwsx",
            "Kryptik.noe",
            "Exploit.msoffice",
            "Agen.1038489",
            "Agent.nbae",
            "Heur:adware.startsurf",
            "Packed.asprotect",
            "Wannacry",
            "Macro.trojan.dropperd",
            "Packed-gv",
            "Hw32.packed",
            "Packed.vmprotect",
            "Trojan.autoruns.generickds",
            "Webtoolbar",
            "Gen:variant.ursu",
            "Heur:remoteadmin.generic",
            "Trojan.script",
            "Opensubtitles.a",
            "Heur:trojan.linux.agent",
            "Hacktool.binder",
            "Trojan:python/downldr",
            "Feodo",
            "Loki bot",
            "Vb:trojan.vba.agent",
            "Fake ,promethiumm ,strongpity",
            "Trojanspy.python",
            "Emotet",
            "Malicious.71b1a8",
            "Backdoor.msil.agent",
            "Backdoor.xtreme",
            "Pathwiper",
            "Tsgeneric",
            "Js:trojan.cryxos",
            "Hacktool.bruteforce",
            "Agen.1045227",
            "Msil.downloader",
            "Packed.netseal",
            "Tor - s0183",
            "States",
            "Js:iframe",
            "Malicious.f01f67",
            "Sdbot.caoc",
            "Exploit.w32.agent",
            "Icefog",
            "Trojan.doc.downloader",
            "Malicious.d800d6",
            "Malware.heur_generic.a",
            "Ransom.win64.wacatac.oa",
            "Locky",
            "Agent.aso",
            "Trojan.pws",
            "Indiloadz.bb",
            "Malwarex",
            "Trojan.malware.300983",
            "Adware.downware",
            "Heur:webtoolbar.generic",
            "Zbd zeus",
            "Trojan.html.phish",
            "Heur:trojan.ole2.alien",
            "Gen:variant.graftor",
            "Gen:heur.msil.inject",
            "$webwatson",
            "Susp.rtf.objupdate",
            "Suspicious.cloud",
            "Sgeneric",
            "Pua.gen",
            "Delf.nbx",
            "Behaveslike.exploit",
            "Snh:script [dropper]",
            "Trojan.cud.gen",
            "Gen:variant.mikey",
            "Trojan.python",
            "Script.inf",
            "Hacktool.cheatengine",
            "Gen:nn.zexaf.32515",
            "Agent.aik.gen",
            "Dldr.agent",
            "Trojan.msil.injector",
            "Presenoker",
            "Pua.reg1staid",
            "Zpevdo.b",
            "Elf",
            "Html:script",
            "Heur:exploit.generic",
            "Heur:trojan.msil.tasker",
            "Risktool.phpw",
            "Vb:trojan.valyria",
            "Wannacryptor",
            "Gen:heur.ransom.msil",
            "Downldr.gen",
            "Gen:variant.jaiko",
            "Dropper.trojan.generic",
            "Gen:variant.cerbu",
            "Wacapew.c",
            "Dropped:generic.ransom.dmr",
            "Smokeloader",
            "Generic.msil.grwtpstealer.1",
            "Ransom_wcry.smalym",
            "Susp.lnk",
            "Tscope.trojan",
            "Possiblethreat.pallas",
            "Troj_frs.vsntfk19",
            "Malicious.11abfc",
            "Kryptik.gucb",
            "Trojanspy",
            "Trojan.pornoasset",
            "Trojan.psw.python",
            "Filerepmalware",
            "Trojan.java",
            "Heur:trojan.msoffice.alien",
            "Malware.tk.generic",
            "Qvm201.0.b70b.malware"
          ],
          "industries": [
            "Telecommunications",
            "Government",
            "Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in",
            "Technology"
          ],
          "unique_indicators": 152371
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/microsoft.com",
    "whois": "http://whois.domaintools.com/microsoft.com",
    "domain": "microsoft.com",
    "hostname": "cert.microsoft.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 19,
  "pulses": [
    {
      "id": "69e4ce38b03b0bb283c78a42",
      "name": "CAPE Sandbox- circa 1980",
      "description": "I dont even have windows and its haunting me. The real treasure today was this though.. you were tricky with your 1980's work to find:\na74535b274b8bfa42e4d7dd33fd8703e\n2bcdb3bf34303a29106a3aefa21d611a170443ea\n4da1f382887248188f43e579f6a28163d4337cca2a7d8dc893b58dff35e9c745\n244aaea6a195a18bbd72a13a9a421e72",
      "modified": "2026-04-19T15:02:19.766000",
      "created": "2026-04-19T12:44:40.519000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1064",
          "name": "Scripting",
          "display_name": "T1064 - Scripting"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1542",
          "name": "Pre-OS Boot",
          "display_name": "T1542 - Pre-OS Boot"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 90,
        "FileHash-MD5": 196,
        "FileHash-SHA1": 174,
        "FileHash-SHA256": 1546,
        "URL": 157,
        "hostname": 403,
        "domain": 80,
        "CIDR": 4,
        "email": 10
      },
      "indicator_count": 2660,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "5 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d9675a25be662c17cd3a9c",
      "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
      "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
      "modified": "2026-04-19T09:06:31.781000",
      "created": "2026-04-10T21:10:50.646000",
      "tags": [
        "malicious",
        "Microsoft",
        "intent: reckless",
        "wiper",
        "Transip",
        "bankers document gone rogue",
        "Tehran",
        "pdfkit.net",
        "United",
        "broken Docusign seal",
        "esign violation",
        "us lawyers",
        "Iran",
        "IP Abuse US",
        "Spreader",
        "corruption that spread",
        "52.123.250.180",
        "Mass Data Loss and exfiltration",
        "Docusign exploited by insecure workflows",
        "Adobe exploited by insecure workflows",
        "threat map",
        "Infra / healthcare / more at risk from this negligence",
        "remediation: long. expire the certs. block 53..",
        "accountability, NOW.",
        "Burned",
        "Kitplay",
        "iOS",
        "Watering hole",
        "Webkit",
        "Religious Regime",
        "MS Office",
        "Compliance Hold Purgatory",
        "WIN EXE.32",
        "Firmware neutral",
        "Trusted Insider",
        "DKIM, SPF, DMARC Failures",
        "No Problems"
      ],
      "references": [
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "People who exploit this put the US at risk. Bottom line.",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "This document might expose someone, more than another.",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": "69a82c54067ca1d502b1eb6c",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 70,
        "hostname": 227,
        "CVE": 4,
        "URL": 368,
        "domain": 110,
        "IPv4": 34,
        "FileHash-MD5": 5,
        "FileHash-SHA1": 26,
        "CIDR": 4,
        "email": 20,
        "JA3": 1
      },
      "indicator_count": 869,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "11 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d967590f40c612c90ce84f",
      "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
      "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
      "modified": "2026-04-19T09:05:10.432000",
      "created": "2026-04-10T21:10:49.749000",
      "tags": [
        "malicious",
        "Microsoft",
        "intent: reckless",
        "wiper",
        "Transip",
        "bankers document gone rogue",
        "Tehran",
        "pdfkit.net",
        "United",
        "broken Docusign seal",
        "esign violation",
        "us lawyers",
        "Iran",
        "IP Abuse US",
        "Spreader",
        "corruption that spread",
        "52.123.250.180",
        "Mass Data Loss and exfiltration",
        "Docusign exploited by insecure workflows",
        "Adobe exploited by insecure workflows",
        "threat map",
        "Infra / healthcare / more at risk from this negligence",
        "remediation: long. expire the certs. block 53..",
        "accountability, NOW.",
        "Burned",
        "Kitplay",
        "iOS",
        "Watering hole",
        "Webkit",
        "Religious Regime",
        "MS Office",
        "Compliance Hold Purgatory",
        "WIN EXE.32",
        "Firmware neutral",
        "Trusted Insider",
        "DKIM, SPF, DMARC Failures",
        "APKmirror",
        "ILOVEYOUBABY",
        "No Problems",
        "Christmas Tree EXEC Code Red worm Computer virus Nimda",
        "Wanna Cry",
        "APK",
        "DC RAT",
        "Emotnet",
        "Redline Swiper",
        "Open Door",
        "Bankers Document",
        "Y2K",
        "wsscript.exe, VBE",
        "Compliance Lock Trap",
        "Globalsign 2020 (potentially exploited)",
        "Heuristic Smear",
        "Gatsby Library Loader DLL",
        "w31999",
        "UofA"
      ],
      "references": [
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "People who exploit this put the US at risk. Bottom line.",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "This document might expose someone, more than another.",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
        "Micro - Dates to look for specific: April/May/June 2025",
        "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
        "Amazon- Check new cert subscribers on or around Sept 15 2025",
        "Entrust to Sectigo- Review vendors",
        "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
        "CA DMV- 2020 exploits, if even exist in your records, may be related.",
        "Digi/Global Sign - audit 2020 digital intersect",
        "Proton.me/Zenbox: Audit July 2025",
        "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
        "APKMirror https://www.apkmirror.com",
        "Google Docs 1.25.202.02 APK Download by Google LLC",
        "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025.",
        "Y2K",
        "US, Philippines, Ukraine, Iran, China. Alberta.",
        "France",
        "Germany, Austria, and Switzerland GmbH",
        "Gatsby Library Loader, DLL",
        "Spellbinding! Indeed. SpellEditor.exe"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": "69a82c54067ca1d502b1eb6c",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3516,
        "hostname": 1614,
        "CVE": 7,
        "URL": 1806,
        "domain": 1416,
        "IPv4": 888,
        "FileHash-MD5": 731,
        "FileHash-SHA1": 787,
        "CIDR": 6,
        "email": 27,
        "IPv6": 10,
        "JA3": 2
      },
      "indicator_count": 10810,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "11 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "698e93e1ab02db8c49e8c3ed",
      "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
      "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
      "modified": "2026-04-19T08:11:41.130000",
      "created": "2026-02-13T03:00:49.872000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27678,
        "FileHash-SHA256": 47676,
        "FileHash-MD5": 42534,
        "FileHash-SHA1": 23213,
        "hostname": 33703,
        "URL": 75433,
        "SSLCertFingerprint": 30,
        "CVE": 7582,
        "email": 313,
        "FileHash-IMPHASH": 8,
        "CIDR": 26205,
        "JA3": 1,
        "IPv4": 80,
        "URI": 5
      },
      "indicator_count": 284461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "12 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1b46238df27ff6680430a",
      "name": "Analysis- 12/12/24 Darkgate- 9e4f036dd6fbb45ce414cb5d040b3255b5ccc9ecacbfaf022b631545f9a19a02.zip (MD5: 71E189A0B08891CFFAB6E656FC49E00A) Malicious activity - Interactive analysis ANY.RUN",
      "description": "<<Anomalous binary characteristics have been identified in a file that is being used to compile a Windows operating system for the first time in the history of the software, as well as an unauthorised virus>> Darkgate. Links wouldnt attach. User does not have whatsapp.",
      "modified": "2026-04-17T07:11:13.591000",
      "created": "2026-04-17T04:17:38.518000",
      "tags": [
        "delete",
        "yara detections",
        "high",
        "medium",
        "whatsapp plugin",
        "whatsapp",
        "read",
        "write",
        "top source",
        "top destination",
        "virustotal",
        "guard",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 57,
        "FileHash-MD5": 54,
        "FileHash-SHA1": 50,
        "FileHash-SHA256": 431,
        "URL": 328,
        "hostname": 385,
        "domain": 409,
        "email": 51,
        "CIDR": 40
      },
      "indicator_count": 1805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69db609269c77812f937026e",
      "name": "CAPE Sandbox ----- emulex fc 2.72.011.002-3",
      "description": "emulex fc 2.72.011.002-3, Malware Behavior Catalog Tree\nAnti-Behavioral Analysis\nOB0001\nVirtual Machine Detection\nB0009\nSoftware Packing\nF0001\nAnti-Static Analysis\nOB0002\nSoftware Packing\nF0001\nDefense Evasion\nOB0006\nSoftware Packing\nF0001\nDiscovery\nOB0007\nFile and Directory Discovery\nE1083\nExecution\nOB0009\nCommand and Scripting Interpreter\nE1059\nFile System\nOC0001\nDelete File\nC0047\nGet File Attributes\nC0049\nSet File Attributes\nC0050\nRead File\nC0051\nWrites File\nC0052\nProcess\nOC0003\nTerminate Process\nC0018\nCommunication\nOC0006\nHTTP Communication\nC0002\n\nWho are you protecting? Look at your root certificate map to 2018-19. Im not mad, I am just disappointed in the lack of cyber security awareness and cryptographic failures. If I see one more unsigned DNSSEC. Edge node completely exposed. Maybe let CISA and the NSA handle things since they are competent. unknown agency- #burnedyourowncountry.\nPalo Alto, level blue, falcon sandbox, cape, yomi, sec, arc- you are heroes for picking up malware that evades everything.",
      "modified": "2026-04-15T19:46:25.951000",
      "created": "2026-04-12T09:06:26.754000",
      "tags": [
        "hbanyware",
        "hbas",
        "true",
        "reportlocation",
        "programfiles",
        "command line",
        "enable silent",
        "mode",
        "full",
        "local only",
        "false",
        "path",
        "example",
        "windows sandbox",
        "clear filters",
        "show",
        "fibre channel",
        "emulex fibre",
        "emulex network",
        "fibre chann",
        "host b",
        "network",
        "emulex",
        "network cards",
        "find",
        "UNITED STATES SENT.",
        "Still love USA.",
        "bankers doc",
        "ESign Violation",
        "cyber warfare",
        "Fraud",
        "pdfkit.net",
        "CIVIL rights violation",
        "geofence",
        "whistleblower",
        "adobe exploited from unsafe practices",
        "certificate abuse",
        "wiper",
        "Docusign exploited from unsafe practices",
        "abuse",
        "modification of the record",
        "date changes",
        "deleting evidence",
        "wateringholeleftwideopen#RiskManagementKnowledgeDeficient",
        "firmware neutral",
        "fraud",
        "espionage",
        "Iloveyou.txt",
        "APTnull.",
        "PlutoniumoftheInternet",
        "apiabuse",
        "Put Zen at risk",
        "Microsoft exploited from misuse of power and secure protocols",
        "Spyonyourinternalframework.",
        "fsquirt.[exe]",
        "bluetooth tampering",
        "wormhole",
        "backdoor",
        "GITlikeMITbutSouth",
        "pool",
        "CloseDoorsProper",
        "spellbound.[exe]",
        "Wizard",
        "GUI of Bluetooth File Transfer Wizard",
        "<fsquirt",
        "Silkwood",
        "RF's, EMF's, EF's - beyond reasonable measure",
        "lateral moving world wide higher ed warrants further research, G",
        "emulex fc 2.72.011.002-3"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984872&Signature=X7ut04viSpboUfiHbVbGH602vbGaavKO28%2FuQZ9YCLjbW%2Bl9JHGrffH4HHtGQ39GPFGg3uUwyMpuOewArLSuI0W%2F0SjlRr%2B3ob5iUQ8eckXWI47mIElQtuCwRStAGCclC8lI%2BsnrEI7u%2FvPhk16ucrMhQtHiSehYuWwNi1lQkbG3Y5ZoDqClBlw1uSMm1jm1Gpu1EBVSIeAqmbV33HSK%2FDTrwzhuwObiyOu4RKE9E7MOmj%2",
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984910&Signature=hjdKVB1Hclv%2FNw7qh%2FV50rCooI70BC8NJcq77KWRUu6VAlxs8vV%2FWfNLh9VzjKS2pBgR7wAaaDp6GwPof61nS4TwykWgUO%2FavR45JKGxhUsjhYKLE5VQoAZkh13wvx1nTVwH%2FP6fx71mJlF71bDqJe7pjpKdd3jyGRDGC6ksN3fMJ%2FRVnusGPDwzZXpy9F6CUYZ1tT9xuK7k3zz9xdIV5e0noQ9s7P343Ca7ROLOUhs9"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 182,
        "FileHash-MD5": 771,
        "FileHash-SHA1": 836,
        "FileHash-SHA256": 2524,
        "URL": 810,
        "domain": 764,
        "email": 112,
        "hostname": 2635,
        "URI": 3,
        "CVE": 7,
        "CIDR": 12,
        "JA3": 1
      },
      "indicator_count": 8657,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a82c54067ca1d502b1eb6c",
      "name": "TTB-Chained (Tehran-Transversal Belasco Chain)",
      "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion.\nThe conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. In Infra/Bank/Gov sectors, TTB executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos",
      "modified": "2026-04-10T21:08:46.934000",
      "created": "2026-03-04T12:57:56.738000",
      "tags": [
        "malicious",
        "Microsoft",
        "intent: reckless",
        "wiper",
        "Transip",
        "bankers document gone rogue",
        "Tehran",
        "pdfkit.net",
        "United",
        "broken Docusign seal",
        "esign violation",
        "us lawyers",
        "Iran",
        "IP Abuse US",
        "Spreader",
        "corruption that spread",
        "52.123.250.180",
        "Mass Data Loss and exfiltration",
        "Docusign exploited by insecure workflows",
        "Adobe exploited by insecure workflows",
        "threat map",
        "Infra / healthcare / more at risk from this negligence",
        "remediation: long. expire the certs. block 53..",
        "accountability, NOW.",
        "Burned",
        "Kitplay",
        "iOS",
        "Watering hole",
        "Webkit",
        "Religious Regime",
        "MS Office",
        "Compliance Hold Purgatory",
        "WIN EXE.32",
        "Firmware neutral",
        "Trusted Insider",
        "DKIM, SPF, DMARC Failures"
      ],
      "references": [
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "People who exploit this put the US at risk. Bottom line.",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "This document might expose someone, more than another.",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 70,
        "hostname": 222,
        "CVE": 4,
        "URL": 363,
        "domain": 108,
        "IPv4": 33,
        "FileHash-MD5": 5,
        "FileHash-SHA1": 26,
        "CIDR": 4,
        "email": 20
      },
      "indicator_count": 855,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "8 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d87573143e567e8503beda",
      "name": "CAPE Sandbox - Google Domain Browser",
      "description": "<Google has released a report on malicious code found in a web file. \u00c2\u00a31.5m of data, which is believed to be more than 100 times more powerful than Google's own.> Some insight on a browser sandbox. mitm.",
      "modified": "2026-04-10T04:08:36.918000",
      "created": "2026-04-10T03:58:43.549000",
      "tags": [
        "title",
        "doctype html",
        "google",
        "ce62bb",
        "style",
        "error",
        "image",
        "mitre attack",
        "network info",
        "performs dns",
        "urls",
        "t1055 process",
        "overview",
        "processes extra",
        "overview zenbox",
        "verdict",
        "phishing",
        "next",
        "ip traffic",
        "msft",
        "msft nethandle",
        "net1500000",
        "server",
        "corporation",
        "chaturmohta",
        "orgroutingref",
        "orgabusehandle",
        "microsoft abuse",
        "orgabuseref",
        "microsoft",
        "orgid",
        "msft address",
        "microsoft way",
        "city",
        "stateprov",
        "postalcode",
        "thumbprint"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775792988&Signature=M1J9CaQkigeg5YRUts8g89wpgmwVxVFRSm9L7fFYPqBizkGksAY%2BQXAESjDzcmPanQSRoqOJXy9yNcu%2F4pPkcUbFtUg8oheQzdL2ebI2eOElYvDV8Mh1Su0AthuKtQT2eC0LsybOE1tRIZO7gxtwxN1CpF5ZhSdES8HaMIFIPL7xsOgmhx4IrdEtjDVHMSCRHnIPuGzO4aQn%2Bl4mga3fI%2FyYiJoFWyMh3OiTXZi%2FidlmFFy9IZTT",
        "https://vtbehaviour.commondatastorage.googleapis.com/85b04c04a7046a296d77251f2236ad5e7ce32fbaab17c590ef372bf00497fbd5_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775793011&Signature=Obu7zDEJiUY4g9RFOhUIFYbnTGp8YMLvwJCCIR8YL6KFoTrbPiqoltMTn%2FJbTCwl%2Bxky0XNZLQJ2Bj5RCjBwsG382Ckn5T596CYG%2Fk%2B%2FZl5rfYfzgjGwaLT5bO0t%2B6nmKGUTqsZuubwpBtp2leCiw6rVYimL8xulbJF30wh5qDBfH4u%2FsGJrRnSd%2BHiu%2B8YWf%2B39QE9Q%2BazzeRFrq7Jt4DDRRC%2FXY2D1GdxmPzPrYkI4c7"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 119,
        "IPv4": 81,
        "FileHash-SHA1": 114,
        "FileHash-SHA256": 543,
        "domain": 122,
        "hostname": 411,
        "URL": 721,
        "CIDR": 3,
        "email": 6
      },
      "indicator_count": 2120,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "9 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d747314a8fc4fa30250fe9",
      "name": "VirusTotal report\n                    for program.exe",
      "description": "<A new tool has been developed by JetBrains that can detect \"unusual processes\" accessing desktop.ini, a folder that is accessed only by Windows Explorer and its associated operating system ( Explorer).> Report date relevance: May 18 2025.",
      "modified": "2026-04-09T07:29:31.205000",
      "created": "2026-04-09T06:29:05.116000",
      "tags": [
        "explorer",
        "maxime thiebaut",
        "files",
        "imageendswith",
        "windows sccm",
        "pe file",
        "drops pe",
        "sample",
        "drops",
        "pe32",
        "intel",
        "ms windows",
        "infects",
        "found",
        "mitre attack",
        "persistence",
        "info",
        "next",
        "windows sandbox",
        "calls clear",
        "users",
        "nothing",
        "registry keys",
        "change",
        "mutexes nothing",
        "parent pid",
        "full path",
        "command line",
        "files c",
        "devicecng c",
        "bit locker hijacked",
        "illegal one drive cross tenant",
        "Esign violation",
        "non secure workflow",
        "wiper",
        "MDMenrollment misuse",
        "broken seal",
        "pdfkit.net DMV",
        "vzwbiz",
        "modified after creation non secure workflow",
        "Docusign exploited by non secure workflow",
        "Human Error/Spyware/Risk+",
        "Abobe Exploited by non secure process",
        "CaRoot Cert Abuse",
        "cryptography unsound"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715909&Signature=gpI0cV%2Bz5SujLXqKc%2FMViiMPztLVAF6Rp00wpW3LF4PyrCqLg7GTlahQtBw0v4rtG0E8HaaDkNRYZ6xPc%2BaCuTHHzf0b8HN0%2BOiY%2B%2Bk4Q5eiI%2BJCJiWefs3vtk9u5bFyGQqM4nzF3u1uk2E8d3TKiy09A5K7YNLjbAsewBUu5mmJZsTeErl3nBhQcKu1stwt1ycd78SLCg8fUl3U7DDaqfd3hJbY98lWj8e6NwMu6VxskCRDdSQsdWj2",
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715951&Signature=XmRkiqq6Fjiq21rddntr3oHg%2BIPR1SrVwk6v5ZZ%2FJ4PkIpl7sqX1DjtJMGHoYvndxGmCeSCYQ08LS9hYRAWXupAhPzRcTkFcmq6KY%2FyMoab3l0SDixcrT9tLxB4iEobBJOzX0Fb%2B8QDyAbyjsuoKSMNCQC0CrVZyT7X54GsN93BU0FXiJWIIluOisGnjwoqL3rdMF8%2BPEJgkcUJTOIuIRaX57nsrXAMIv7dbn9BGZFDXH0",
        "https://vtbehaviour.commondatastorage.googleapis.com/2566a2924072ac9821eb7ecde8bedf7197ceb09d99cd17ff48864a2323546bf9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775715964&Signature=A%2BPIQBCth46RBnI1rK4wnu%2B0XtyUhEdo1TORDahLnR6yM%2BbI8gLsWpjDTmV8aSDFIcFddcr%2BCs9TqMa65j3jNrLz9NcyZekNiDekQlkYCbMCIiYduRDT9nLy485HDee9RRJ3YSbeqJQSjzOXemRKeyL8rg3ml6WTeCly22CrQPLljCwWWUbsQLYOMqu0OADj%2BKEZv%2B5gVOmJsQIBQugE%2F0xSYw1lKowIs5nlYy9Z0hbFUycO"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "PathWiper",
          "display_name": "PathWiper",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [
        "Government",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 81,
        "URL": 421,
        "hostname": 491,
        "FileHash-MD5": 477,
        "FileHash-SHA1": 298,
        "FileHash-SHA256": 719,
        "IPv4": 177,
        "CVE": 5,
        "email": 12,
        "CIDR": 2
      },
      "indicator_count": 2683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "10 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d5a8def91087434d1df14b",
      "name": "VirusTotal Windows Sandbox",
      "description": "A security alert has been launched by InQuest Labs R&D at the University of California, San Francisco, to investigate the use of Base64 as an address for web addresses and links on the internet. Jd- 3b5074b1b5d032e5620f69f9f700ff0e\n0e07085e04cc7020652995b536fd99a7\n123402a56d3e6b49eb471ee3bd1ccd0d\n131ae075b4ea025e4cac3262abc1cc51\n16896e98512813240dde29439b9dbabb\n2823dc3a4a78c0e45d279d052945dddf\n28a2c9bd18a11de089ef85a160da29e4\n34974b6437558a9b630f17e562868970\n4aad38bb2ab12dfcf77b45dfcad42801\n54af8c5e2731171ab2e103b55fad6ba0\n6316bde54a7388dd96416355e16bbec6\n7d9ca857e500f919822d02e907fd376c\n7fa57cdb6989cc29c9c6e05c1f98a04d\n843d00145c833145305dfd86a9944d47\n9cea5dc0fe8092f4d251f17e173dab20\nadc58c2ebe33331d81758c4ab4eb2091\nb190d3580b6b75594a7d53e0ab7b075c\nb95fd39f922163b94b40d5b7605fe0c9\nd1352a4605e4f045b6f78681227160ca\nd786947b5d04c6705014803f265cc73f\ne16530d7c64d3654ba93408c8d6aff9a\ne4c8aa0e70185e550a8d64e1408e2ccd\nedfa0ce8dc4638c67a6818cf469dbf3f\nf4ce811849cf8ad158970c1b18a2d457",
      "modified": "2026-04-08T02:06:12.150000",
      "created": "2026-04-08T01:01:18.419000",
      "tags": [
        "sha256",
        "ssdeep",
        "zizqw3g tlsh",
        "csv text",
        "magic csv",
        "magika csv",
        "file size",
        "x32gwm",
        "inquest labs",
        "base64",
        "x2bx2fx38x39",
        "x2bx2fx39wz",
        "writefile",
        "readfile",
        "isbadreadptr",
        "setfilepointer",
        "windows api",
        "inquestpii",
        "loadlibrarya",
        "shellexecutea",
        "getprocaddress",
        "microsoft",
        "msft nethandle",
        "net52",
        "net520000",
        "msft",
        "orgid",
        "msft address",
        "microsoft way",
        "city",
        "stateprov",
        "microsoft abuse",
        "contact orgid",
        "orgdnshandle",
        "orgdnsref",
        "orgabuseref",
        "peering",
        "orgtechhandle",
        "domain name",
        "status",
        "windows sandbox",
        "calls process",
        "id file",
        "magic",
        "trid macbinary",
        "memo file",
        "apollo database",
        "engine",
        "vxd driver",
        "sybase",
        "ip traffic",
        "tls sni",
        "cname",
        "default",
        "cultureneutral",
        "file type",
        "mwdb",
        "bazaar",
        "sha3384",
        "inprocserver32",
        "accept",
        "shutdown",
        "win64",
        "url final",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "confuserex mod",
        "aspirecrypt",
        "detects",
        "reactor",
        "beds protector",
        "ps2exe",
        "bsjb",
        "boxedapp",
        "cyaxsharp",
        "cyaxpng",
        "smartassembly",
        "koivm",
        "confuserex",
        "obfuscator",
        "aspack",
        "titan",
        "enigma",
        "vmprotect",
        "strings",
        "rlpack",
        "antiem",
        "antisb",
        "themida",
        "loader",
        "sality",
        "dnguard",
        "shell folders",
        "parent pid",
        "full path",
        "command line",
        "guard",
        "pe file",
        "binary",
        "contains",
        "aslr",
        "https",
        "performs dns",
        "network info",
        "sample",
        "creates",
        "window",
        "malicious",
        "next",
        "systemroot",
        "folders",
        "k netsvcs",
        "file execution",
        "matches rule",
        "snort",
        "get https",
        "medium",
        "info",
        "mtu denial",
        "needed",
        "df bit",
        "unique rule",
        "http requests",
        "memory pattern",
        "post https",
        "dns resolutions",
        "domains",
        "urls https",
        "externalnet",
        "homenet",
        "5762",
        "imageendswith",
        "dns query",
        "browser",
        "nextron",
        "advanced threat",
        "imagestartswith",
        "filesseamonkey",
        "whale",
        "fileswaterfox",
        "filesfalkon"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/657ade511221cda6d5391d6801efbf5857e91e8439319fd70d2a54d02e2697a0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609236&Signature=DeA5O6CTtdDaFLThPBzSDLEN8Osrr52D6l5yCN5bZX5zQjnkvPK3g8QEnK%2FQOZcS6WBDjtPuqSaEsLVXQ652jk0DLtUdQ5x5Tf2QcLEaJo7eeqC27bFTZBED9cwgsbA8rGtb83msJKgxRV6v%2BNcAuehnhhx%2FdluCJQ6wWIHjkCXiGm1h%2FLoJ3zG4VpMtpfFT8yIsc9ooKxbljJx3b7%2BcwgUCUJh%2FTzgrDOFT%2Bk3Oow",
        "https://vtbehaviour.commondatastorage.googleapis.com/05c0d5df13db7952792ccf35fff2eeea88fd0303e166d5e86285359e5d82163a_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609315&Signature=yID4RduHstM4TRFgmJkPYWfFKEByIyDLVxqxQ4J14L5K%2BPR97Pv9y1EWBhQufdvpTr0Vw69MuXZ7pf6mOhKl%2FZ%2Fd7RkVb8psB0SGRdPOqnNQ8zHDZ%2Bb3EAFlIMTeOT6%2BkM8bZF0v9FOpDPYCVS7qWNIOJqed2CkyLMa3MhOf%2Ba4FV%2BW7nDVf3rWt238pP%2F2wOxHtU6%2F0FTIUjozqyUoW5fF9ePLN5a8CrGmacl",
        "https://vtbehaviour.commondatastorage.googleapis.com/7b8931f02a86e3c8becd373d08f6a277b1a2d981d0e4d27b341ae56c84bbcd84_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609482&Signature=Io2DgedeXtCfGstTsFSe2TeudaAytkQ3s377BiOyuabRYdRFEUNDBJMGwe0YqA7y4VOpzZBHyl7MbW9%2Bv3C%2BNucxzMbLEBfJtWBO1IqfvlvMqc32cZjqBOtqB1%2B0aTuaucgzSAVc8PC3VvUbZUaFDBFixJjmgzZMxUb6JRGYyAsHHx0k2GvsYa6oL6L38%2Btsk9f7NIov%2F8IxY1Ha%2FRGmaFNnJ61v2jUOsCDihyPELjLRsTui1b",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609722&Signature=WqkdQY8Bmk%2FkZQxgUlRTtxsUV9ifQ20npBPZi66iZhBFkMlTDlpYVSWs8O3Z3cx%2F5o74iHvujaLyqwtmi%2Bomlrw%2BltLOsTWdLJh%2B3qsX8nB2k%2BDK5%2BZRweROecgBuzTre64tr%2FZhora9m8KiyVewHoBS5vT5lew%2FEcps4pYFdDjGDRv4Hxw00%2FUmsEtMCWRSsp8RRd0LM5%2BDSjY3jsbRfPAjcOFfKoStNFYYDPOs",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609756&Signature=Rdmc7zdC8WIeE5au2ytaKCAZzS6CnYteTrJC0XEqLRR%2FmH9EjX7HJojbe74TjvW3GvkxbLs1vG04awZwb0YXxg9D8%2BQ2HRyO5ErFRMIL9LwZLJmqsZ9NIFf7AFbVlyB2%2B6lH0z552NSsdy3n5rXeD8TLXab9D9LGTyXkPBbp%2BOjDpMBmSOYfVgAyJT17UtY7vLGxQ%2FCJsYWEMAAinVDm%2F%2FvT5z%2BIBaROQDm6CRIRomamw57lq08hFK",
        "https://vtbehaviour.commondatastorage.googleapis.com/bca3236549f740f6582dcd44d5d98465a5a42e784ca5fcece4c9f00b383d12f0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609812&Signature=j%2BmIrkE%2FbH3FNOHyPF0nlsfnFg%2ByHY%2BzIz6oRfDLCGpEPHs4OG%2FiJf5b61rVbsm57qg4xdjsEr4Stv5tGDBKP5OWIT91qaKtVPC2Cqzzv8o6rctKzNZ0zoWD6xMo3PIi3u9ytawP%2Bg2Ub5pJsF2wzyldWroo0FNDHB0Y3xGtAefZxqwSzZQufb9Kn2%2Fy30S9zoWhQXrFWTFr%2FvrszmwbK%2FXSDq2S8HdeXnWpWP",
        "https://vtbehaviour.commondatastorage.googleapis.com/ea342c4f84120e6a5dfab371f971d4763834a7e306b00c72afc76d8e26783b20_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775609844&Signature=fB7RV8R%2ByVZoiNavtDWQxujcWbqBpR4b5Br4Brs2E2aI%2FR7C6RW2zPdwquB%2FowTDpVFDUkH%2BAzXgsMaTruvatv4qQrjkyqlZxzqogbWxIuVy2X7HVdc%2B5QIi4AiR74Pm8XyuWufmtmILOJKq9JFgYYXfjZSHojqZoN6GDU%2BRxBF%2FMNvfjaapTTJooQB2elVP0DQpD2v1SxCl%2FNQDPTaybrYD5fBMcOnNoQ0KvurH%2BDI6"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 197,
        "FileHash-SHA1": 135,
        "FileHash-SHA256": 186,
        "URL": 192,
        "YARA": 55,
        "hostname": 259,
        "domain": 57,
        "CIDR": 5,
        "email": 9,
        "IPv4": 221
      },
      "indicator_count": 1316,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "11 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cert.microsoft.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cert.microsoft.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631217.7170448
}