{
  "type": "URL",
  "indicator": "https://chatgpt.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://chatgpt.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4023493596,
      "indicator": "https://chatgpt.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "69b7325cfef4ee30de194952",
          "name": "CAPE Sandbox",
          "description": "",
          "modified": "2026-04-14T22:18:06.069000",
          "created": "2026-03-15T22:27:40.798000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 4,
            "hostname": 60,
            "URL": 82,
            "domain": 9
          },
          "indicator_count": 159,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69db4f2dc509a1e8210f1b68",
          "name": "CAPE Sandbox",
          "description": "CivicPlus, LLC (ICONE-2) is a US-based company with a name that includes the word \"CIVICPLUS\", \"civicplus\", and \"icon Enterprises, Inc\".",
          "modified": "2026-04-12T08:36:17.724000",
          "created": "2026-04-12T07:52:13.594000",
          "tags": [
            "network admin",
            "civicplus",
            "net192",
            "net1920000",
            "houston",
            "suite e",
            "city",
            "server",
            "select contact",
            "domain holder",
            "date",
            "form",
            "submission",
            "ssdeep",
            "file type",
            "text text",
            "magic unicode",
            "utf8",
            "crlf line",
            "trid text",
            "magika txt",
            "file size",
            "chatgpt",
            "doctype html",
            "meta",
            "ai system",
            "research",
            "preview",
            "gmt server",
            "self",
            "dynamic",
            "html info",
            "title chatgpt",
            "meta tags",
            "thumbprint"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/528831360d5c49743bf0dcf9cb0af1f76c694de9dfff79b32098d68c3c592f8a_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775980441&Signature=QefJtz2s096UJTV1NljpeJrvdFWJBbHJre5UDOJQeemvu9EGI8UaxLTPvZxejJToeSgqCCu4zCWniB2V9Xer1ozcM5Vy2xhgRO%2BaFeWFRkjfd5yRyZIGLi65ORYA2oyDhTBUZuQco3NNHZWaS0mWYOpAI662c%2BecYNp5SJTXMB4oKzu9bstiszUfM1HNlWjSpySaxCD4j34gZFgiv5xZGW34IcBSvzfQUWECgUu6jW5Pu4Rr%2FH5TJS%2"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CIDR": 2,
            "URL": 602,
            "domain": 166,
            "email": 37,
            "hostname": 837,
            "FileHash-MD5": 125,
            "FileHash-SHA1": 136,
            "FileHash-SHA256": 1230,
            "IPv4": 399
          },
          "indicator_count": 3534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "7 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b10d1ce4563d38fbbc72d6",
          "name": "disable_duck clone Alberta",
          "description": "",
          "modified": "2026-03-11T07:40:56.177000",
          "created": "2026-03-11T06:35:08.464000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "white",
            "modified",
            "runtime data",
            "ansi",
            "public",
            "months ago",
            "filehashsha256",
            "hostname",
            "domain",
            "path",
            "green",
            "copy",
            "powershell",
            "general",
            "malicious",
            "pixel",
            "suspicious",
            "meta",
            "covenant",
            "virustotal",
            "click",
            "open",
            "cobalt strike",
            "probe",
            "first",
            "installer",
            "template",
            "crypto",
            "cobalt",
            "mozilla",
            "mirai",
            "false",
            "date",
            "title",
            "roboto",
            "arch",
            "android",
            "april",
            "drovorub",
            "squad",
            "baby",
            "geek",
            "tofsee",
            "redline stealer",
            "twitter",
            "service",
            "team",
            "killswitch",
            "mini",
            "cobaltstrike",
            "enterprise",
            "simda",
            "suppobox",
            "ransomware",
            "maldoc",
            "computrace",
            "february",
            "tetris",
            "hybrid",
            "body",
            "iframe",
            "qakbot",
            "double",
            "proton",
            "mark",
            "jakarta",
            "win32",
            "explorer",
            "union",
            "redirector",
            "xrat",
            "model",
            "rogue",
            "done",
            "python",
            "police",
            "thor",
            "xploit",
            "impact",
            "retro",
            "jeff",
            "oilrig",
            "sliver",
            "bypass",
            "info",
            "school",
            "miner",
            "phishing",
            "riots",
            "comment",
            "gafgyt",
            "bashlite",
            "calgary",
            "tech",
            "bitcoin",
            "test",
            "survey",
            "ukraine",
            "gamarue",
            "swisyn",
            "krucky",
            "systembc",
            "june",
            "dridex",
            "agent",
            "close",
            "format",
            "autodetect",
            "strings",
            "contact",
            "switch",
            "community",
            "limits",
            "inquest labs",
            "resources api",
            "cve list",
            "notes blog",
            "drop your",
            "file",
            "kaspersky threat intelligence portal",
            "online virus scan file",
            "online file scanner",
            "kaspersky online scanner",
            "online file virus scan",
            "scan file online",
            "scan file for virus",
            "file scanner",
            "online file virus scanner",
            "check link for virus",
            "kaspersky online scan",
            "check file for virus",
            "false alarm",
            "false detection",
            "false positive",
            "online virus",
            "scanner",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "ualberta",
            "ualberta http",
            "xormozilla",
            "disableduck",
            "virus",
            "static",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "platform",
            "triage",
            "report",
            "reported",
            "analyze",
            "filesize",
            "set value",
            "iocs",
            "process",
            "process key",
            "monitor",
            "resource",
            "config",
            "target",
            "generic",
            "javascript",
            "static analyzer",
            "analyzer",
            "Microsoft",
            "YEG",
            "UAlberta",
            "Google",
            "AHS",
            "Covenant Health"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d/68e01fdde76500b3c20326c4",
            "https://metadefender.com/results/file/bzI1MTAwMzhvTXdHbkVaZGItcW0tbnU2Nmkx_mdaas",
            "https://opentip.kaspersky.com/5E066617CC959DBAB123F23D5D36A4DC4D813358E43EDDBD1A6E7C87827C301D/?tab=upload",
            "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d",
            "https://www.filescan.io/uploads/68e01279f377ab2310519c81/reports/02a0a465-8936-4b6d-99a2-6950b71ab1c5/ioc",
            "https://tria.ge/251003-x8c56azky6/behavioral2",
            "https://www.virustotal.com/gui/file/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d?nocache=1",
            "https://app.threat.zone/submission/db9c1a4a-a706-4ed9-9229-4190f02151bc/overview"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1135",
              "name": "Network Share Discovery",
              "display_name": "T1135 - Network Share Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [
            "Education",
            "Government",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": "68e02ab7156e79ecd34a4929",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4203,
            "CIDR": 8,
            "CVE": 13,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 25,
            "FileHash-SHA256": 74,
            "domain": 117,
            "email": 14,
            "hostname": 76
          },
          "indicator_count": 4561,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "39 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68e02ab7156e79ecd34a4929",
          "name": "Samples of OTX 2096 Libraries - up to 10.03.25",
          "description": "An attempt to skim over a little bit of everything in OTX 2096 for another project in the works\n\nUAlberta sighhh",
          "modified": "2025-11-02T19:00:47.473000",
          "created": "2025-10-03T19:57:43.609000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "white",
            "modified",
            "runtime data",
            "ansi",
            "public",
            "months ago",
            "filehashsha256",
            "hostname",
            "domain",
            "path",
            "green",
            "copy",
            "powershell",
            "general",
            "malicious",
            "pixel",
            "suspicious",
            "meta",
            "covenant",
            "virustotal",
            "click",
            "open",
            "cobalt strike",
            "probe",
            "first",
            "installer",
            "template",
            "crypto",
            "cobalt",
            "mozilla",
            "mirai",
            "false",
            "date",
            "title",
            "roboto",
            "arch",
            "android",
            "april",
            "drovorub",
            "squad",
            "baby",
            "geek",
            "tofsee",
            "redline stealer",
            "twitter",
            "service",
            "team",
            "killswitch",
            "mini",
            "cobaltstrike",
            "enterprise",
            "simda",
            "suppobox",
            "ransomware",
            "maldoc",
            "computrace",
            "february",
            "tetris",
            "hybrid",
            "body",
            "iframe",
            "qakbot",
            "double",
            "proton",
            "mark",
            "jakarta",
            "win32",
            "explorer",
            "union",
            "redirector",
            "xrat",
            "model",
            "rogue",
            "done",
            "python",
            "police",
            "thor",
            "xploit",
            "impact",
            "retro",
            "jeff",
            "oilrig",
            "sliver",
            "bypass",
            "info",
            "school",
            "miner",
            "phishing",
            "riots",
            "comment",
            "gafgyt",
            "bashlite",
            "calgary",
            "tech",
            "bitcoin",
            "test",
            "survey",
            "ukraine",
            "gamarue",
            "swisyn",
            "krucky",
            "systembc",
            "june",
            "dridex",
            "agent",
            "close",
            "format",
            "autodetect",
            "strings",
            "contact",
            "switch",
            "community",
            "limits",
            "inquest labs",
            "resources api",
            "cve list",
            "notes blog",
            "drop your",
            "file",
            "kaspersky threat intelligence portal",
            "online virus scan file",
            "online file scanner",
            "kaspersky online scanner",
            "online file virus scan",
            "scan file online",
            "scan file for virus",
            "file scanner",
            "online file virus scanner",
            "check link for virus",
            "kaspersky online scan",
            "check file for virus",
            "false alarm",
            "false detection",
            "false positive",
            "online virus",
            "scanner",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "ualberta",
            "ualberta http",
            "xormozilla",
            "disableduck",
            "virus",
            "static",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "platform",
            "triage",
            "report",
            "reported",
            "analyze",
            "filesize",
            "set value",
            "iocs",
            "process",
            "process key",
            "monitor",
            "resource",
            "config",
            "target",
            "generic",
            "javascript",
            "static analyzer",
            "analyzer",
            "Microsoft",
            "YEG",
            "UAlberta",
            "Google",
            "AHS",
            "Covenant Health"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d/68e01fdde76500b3c20326c4",
            "https://metadefender.com/results/file/bzI1MTAwMzhvTXdHbkVaZGItcW0tbnU2Nmkx_mdaas",
            "https://opentip.kaspersky.com/5E066617CC959DBAB123F23D5D36A4DC4D813358E43EDDBD1A6E7C87827C301D/?tab=upload",
            "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d",
            "https://www.filescan.io/uploads/68e01279f377ab2310519c81/reports/02a0a465-8936-4b6d-99a2-6950b71ab1c5/ioc",
            "https://tria.ge/251003-x8c56azky6/behavioral2",
            "https://www.virustotal.com/gui/file/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d?nocache=1",
            "https://app.threat.zone/submission/db9c1a4a-a706-4ed9-9229-4190f02151bc/overview"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1135",
              "name": "Network Share Discovery",
              "display_name": "T1135 - Network Share Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [
            "Education",
            "Government",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4203,
            "CIDR": 8,
            "CVE": 13,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 25,
            "FileHash-SHA256": 74,
            "domain": 115,
            "email": 14,
            "hostname": 76
          },
          "indicator_count": 4559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 131,
          "modified_text": "168 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "677aa5b98397262e59834109",
          "name": "openai versus chatGPT",
          "description": "Hybrid analysis Last Anti-Virus Scan: 2025-01-05 19:48:34 (UTC). Tor Relays/Routers and TOR exit nodes were found in network analysis.\nMore scans: https://www.hybrid-analysis.com/search?query=https%3A%2F%2Fchatgpt.com",
          "modified": "2025-02-04T00:02:22.785000",
          "created": "2025-01-05T15:31:05.222000",
          "tags": [
            "chatgpt",
            "openai",
            "tor",
            "placeholder.com",
            "via.placeholder.com",
            "placehold.it",
            "StableAI.exe"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/cf28065e6e2a8ac8812d5cc41ae2141d229a085afb155e158572d9c2fd36d540/66bbc7e33b8b45473008558b",
            "https://www.virustotal.com/graph/embed/gb3908392fffd416897fdba90855a10f8c6da0c83d6a14fc78d62c02db8af634e",
            "https://www.virustotal.com/graph/embed/gc3788134fb984a599fbe5d92802d605be2afeb3505b14133910e150c49a5aa06",
            "https://www.virustotal.com/graph/embed/gc506b9318cdc451fb978cb7e201885605b0ab4ffca7344f3af0f76846bae8626",
            "https://www.virustotal.com/graph/embed/gf7f57a7abbc14cf3bf154e66e1bd8b3a4cd225542f9d4c0e92cb567c86940425",
            "https://www.virustotal.com/graph/embed/gd5ad7b36d7624fe48377ef36384ae281b540af91c4c14a1791d96a8a79712135",
            "https://www.virustotal.com/graph/embed/g2363a9b3ae0a422caff8d99caa57563691cf0817bd9346a8ba5a500349e71c2e",
            "https://www.virustotal.com/graph/embed/g064afe96384849bc81925f0defec631142ebb68b53854add8aba403d2989138a"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 8,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "userlolxxl",
            "id": "276085",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_276085/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4,
            "FileHash-SHA256": 3,
            "domain": 3,
            "hostname": 1
          },
          "indicator_count": 11,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 36,
          "modified_text": "439 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/cf28065e6e2a8ac8812d5cc41ae2141d229a085afb155e158572d9c2fd36d540/66bbc7e33b8b45473008558b",
        "https://www.virustotal.com/graph/embed/g2363a9b3ae0a422caff8d99caa57563691cf0817bd9346a8ba5a500349e71c2e",
        "https://www.virustotal.com/graph/embed/g064afe96384849bc81925f0defec631142ebb68b53854add8aba403d2989138a",
        "https://www.virustotal.com/graph/embed/gf7f57a7abbc14cf3bf154e66e1bd8b3a4cd225542f9d4c0e92cb567c86940425",
        "https://www.virustotal.com/graph/embed/gd5ad7b36d7624fe48377ef36384ae281b540af91c4c14a1791d96a8a79712135",
        "https://www.virustotal.com/graph/embed/gc506b9318cdc451fb978cb7e201885605b0ab4ffca7344f3af0f76846bae8626",
        "https://www.virustotal.com/graph/embed/gc3788134fb984a599fbe5d92802d605be2afeb3505b14133910e150c49a5aa06",
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d",
        "https://www.virustotal.com/graph/embed/gb3908392fffd416897fdba90855a10f8c6da0c83d6a14fc78d62c02db8af634e",
        "https://tria.ge/251003-x8c56azky6/behavioral2",
        "https://vtbehaviour.commondatastorage.googleapis.com/528831360d5c49743bf0dcf9cb0af1f76c694de9dfff79b32098d68c3c592f8a_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775980441&Signature=QefJtz2s096UJTV1NljpeJrvdFWJBbHJre5UDOJQeemvu9EGI8UaxLTPvZxejJToeSgqCCu4zCWniB2V9Xer1ozcM5Vy2xhgRO%2BaFeWFRkjfd5yRyZIGLi65ORYA2oyDhTBUZuQco3NNHZWaS0mWYOpAI662c%2BecYNp5SJTXMB4oKzu9bstiszUfM1HNlWjSpySaxCD4j34gZFgiv5xZGW34IcBSvzfQUWECgUu6jW5Pu4Rr%2FH5TJS%2",
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d/68e01fdde76500b3c20326c4",
        "https://www.filescan.io/uploads/68e01279f377ab2310519c81/reports/02a0a465-8936-4b6d-99a2-6950b71ab1c5/ioc",
        "https://www.virustotal.com/gui/file/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d?nocache=1",
        "https://metadefender.com/results/file/bzI1MTAwMzhvTXdHbkVaZGItcW0tbnU2Nmkx_mdaas",
        "https://opentip.kaspersky.com/5E066617CC959DBAB123F23D5D36A4DC4D813358E43EDDBD1A6E7C87827C301D/?tab=upload",
        "https://app.threat.zone/submission/db9c1a4a-a706-4ed9-9229-4190f02151bc/overview"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [
            "Government",
            "Healthcare",
            "Education"
          ],
          "unique_indicators": 6143
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/chatgpt.com",
    "whois": "http://whois.domaintools.com/chatgpt.com",
    "domain": "chatgpt.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "69b7325cfef4ee30de194952",
      "name": "CAPE Sandbox",
      "description": "",
      "modified": "2026-04-14T22:18:06.069000",
      "created": "2026-03-15T22:27:40.798000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 4,
        "hostname": 60,
        "URL": 82,
        "domain": 9
      },
      "indicator_count": 159,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69db4f2dc509a1e8210f1b68",
      "name": "CAPE Sandbox",
      "description": "CivicPlus, LLC (ICONE-2) is a US-based company with a name that includes the word \"CIVICPLUS\", \"civicplus\", and \"icon Enterprises, Inc\".",
      "modified": "2026-04-12T08:36:17.724000",
      "created": "2026-04-12T07:52:13.594000",
      "tags": [
        "network admin",
        "civicplus",
        "net192",
        "net1920000",
        "houston",
        "suite e",
        "city",
        "server",
        "select contact",
        "domain holder",
        "date",
        "form",
        "submission",
        "ssdeep",
        "file type",
        "text text",
        "magic unicode",
        "utf8",
        "crlf line",
        "trid text",
        "magika txt",
        "file size",
        "chatgpt",
        "doctype html",
        "meta",
        "ai system",
        "research",
        "preview",
        "gmt server",
        "self",
        "dynamic",
        "html info",
        "title chatgpt",
        "meta tags",
        "thumbprint"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/528831360d5c49743bf0dcf9cb0af1f76c694de9dfff79b32098d68c3c592f8a_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775980441&Signature=QefJtz2s096UJTV1NljpeJrvdFWJBbHJre5UDOJQeemvu9EGI8UaxLTPvZxejJToeSgqCCu4zCWniB2V9Xer1ozcM5Vy2xhgRO%2BaFeWFRkjfd5yRyZIGLi65ORYA2oyDhTBUZuQco3NNHZWaS0mWYOpAI662c%2BecYNp5SJTXMB4oKzu9bstiszUfM1HNlWjSpySaxCD4j34gZFgiv5xZGW34IcBSvzfQUWECgUu6jW5Pu4Rr%2FH5TJS%2"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CIDR": 2,
        "URL": 602,
        "domain": 166,
        "email": 37,
        "hostname": 837,
        "FileHash-MD5": 125,
        "FileHash-SHA1": 136,
        "FileHash-SHA256": 1230,
        "IPv4": 399
      },
      "indicator_count": 3534,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "7 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b10d1ce4563d38fbbc72d6",
      "name": "disable_duck clone Alberta",
      "description": "",
      "modified": "2026-03-11T07:40:56.177000",
      "created": "2026-03-11T06:35:08.464000",
      "tags": [
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "white",
        "modified",
        "runtime data",
        "ansi",
        "public",
        "months ago",
        "filehashsha256",
        "hostname",
        "domain",
        "path",
        "green",
        "copy",
        "powershell",
        "general",
        "malicious",
        "pixel",
        "suspicious",
        "meta",
        "covenant",
        "virustotal",
        "click",
        "open",
        "cobalt strike",
        "probe",
        "first",
        "installer",
        "template",
        "crypto",
        "cobalt",
        "mozilla",
        "mirai",
        "false",
        "date",
        "title",
        "roboto",
        "arch",
        "android",
        "april",
        "drovorub",
        "squad",
        "baby",
        "geek",
        "tofsee",
        "redline stealer",
        "twitter",
        "service",
        "team",
        "killswitch",
        "mini",
        "cobaltstrike",
        "enterprise",
        "simda",
        "suppobox",
        "ransomware",
        "maldoc",
        "computrace",
        "february",
        "tetris",
        "hybrid",
        "body",
        "iframe",
        "qakbot",
        "double",
        "proton",
        "mark",
        "jakarta",
        "win32",
        "explorer",
        "union",
        "redirector",
        "xrat",
        "model",
        "rogue",
        "done",
        "python",
        "police",
        "thor",
        "xploit",
        "impact",
        "retro",
        "jeff",
        "oilrig",
        "sliver",
        "bypass",
        "info",
        "school",
        "miner",
        "phishing",
        "riots",
        "comment",
        "gafgyt",
        "bashlite",
        "calgary",
        "tech",
        "bitcoin",
        "test",
        "survey",
        "ukraine",
        "gamarue",
        "swisyn",
        "krucky",
        "systembc",
        "june",
        "dridex",
        "agent",
        "close",
        "format",
        "autodetect",
        "strings",
        "contact",
        "switch",
        "community",
        "limits",
        "inquest labs",
        "resources api",
        "cve list",
        "notes blog",
        "drop your",
        "file",
        "kaspersky threat intelligence portal",
        "online virus scan file",
        "online file scanner",
        "kaspersky online scanner",
        "online file virus scan",
        "scan file online",
        "scan file for virus",
        "file scanner",
        "online file virus scanner",
        "check link for virus",
        "kaspersky online scan",
        "check file for virus",
        "false alarm",
        "false detection",
        "false positive",
        "online virus",
        "scanner",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "ualberta",
        "ualberta http",
        "xormozilla",
        "disableduck",
        "virus",
        "static",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "platform",
        "triage",
        "report",
        "reported",
        "analyze",
        "filesize",
        "set value",
        "iocs",
        "process",
        "process key",
        "monitor",
        "resource",
        "config",
        "target",
        "generic",
        "javascript",
        "static analyzer",
        "analyzer",
        "Microsoft",
        "YEG",
        "UAlberta",
        "Google",
        "AHS",
        "Covenant Health"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d/68e01fdde76500b3c20326c4",
        "https://metadefender.com/results/file/bzI1MTAwMzhvTXdHbkVaZGItcW0tbnU2Nmkx_mdaas",
        "https://opentip.kaspersky.com/5E066617CC959DBAB123F23D5D36A4DC4D813358E43EDDBD1A6E7C87827C301D/?tab=upload",
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d",
        "https://www.filescan.io/uploads/68e01279f377ab2310519c81/reports/02a0a465-8936-4b6d-99a2-6950b71ab1c5/ioc",
        "https://tria.ge/251003-x8c56azky6/behavioral2",
        "https://www.virustotal.com/gui/file/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d?nocache=1",
        "https://app.threat.zone/submission/db9c1a4a-a706-4ed9-9229-4190f02151bc/overview"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1135",
          "name": "Network Share Discovery",
          "display_name": "T1135 - Network Share Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [
        "Education",
        "Government",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": "68e02ab7156e79ecd34a4929",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4203,
        "CIDR": 8,
        "CVE": 13,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 25,
        "FileHash-SHA256": 74,
        "domain": 117,
        "email": 14,
        "hostname": 76
      },
      "indicator_count": 4561,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "39 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68e02ab7156e79ecd34a4929",
      "name": "Samples of OTX 2096 Libraries - up to 10.03.25",
      "description": "An attempt to skim over a little bit of everything in OTX 2096 for another project in the works\n\nUAlberta sighhh",
      "modified": "2025-11-02T19:00:47.473000",
      "created": "2025-10-03T19:57:43.609000",
      "tags": [
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "white",
        "modified",
        "runtime data",
        "ansi",
        "public",
        "months ago",
        "filehashsha256",
        "hostname",
        "domain",
        "path",
        "green",
        "copy",
        "powershell",
        "general",
        "malicious",
        "pixel",
        "suspicious",
        "meta",
        "covenant",
        "virustotal",
        "click",
        "open",
        "cobalt strike",
        "probe",
        "first",
        "installer",
        "template",
        "crypto",
        "cobalt",
        "mozilla",
        "mirai",
        "false",
        "date",
        "title",
        "roboto",
        "arch",
        "android",
        "april",
        "drovorub",
        "squad",
        "baby",
        "geek",
        "tofsee",
        "redline stealer",
        "twitter",
        "service",
        "team",
        "killswitch",
        "mini",
        "cobaltstrike",
        "enterprise",
        "simda",
        "suppobox",
        "ransomware",
        "maldoc",
        "computrace",
        "february",
        "tetris",
        "hybrid",
        "body",
        "iframe",
        "qakbot",
        "double",
        "proton",
        "mark",
        "jakarta",
        "win32",
        "explorer",
        "union",
        "redirector",
        "xrat",
        "model",
        "rogue",
        "done",
        "python",
        "police",
        "thor",
        "xploit",
        "impact",
        "retro",
        "jeff",
        "oilrig",
        "sliver",
        "bypass",
        "info",
        "school",
        "miner",
        "phishing",
        "riots",
        "comment",
        "gafgyt",
        "bashlite",
        "calgary",
        "tech",
        "bitcoin",
        "test",
        "survey",
        "ukraine",
        "gamarue",
        "swisyn",
        "krucky",
        "systembc",
        "june",
        "dridex",
        "agent",
        "close",
        "format",
        "autodetect",
        "strings",
        "contact",
        "switch",
        "community",
        "limits",
        "inquest labs",
        "resources api",
        "cve list",
        "notes blog",
        "drop your",
        "file",
        "kaspersky threat intelligence portal",
        "online virus scan file",
        "online file scanner",
        "kaspersky online scanner",
        "online file virus scan",
        "scan file online",
        "scan file for virus",
        "file scanner",
        "online file virus scanner",
        "check link for virus",
        "kaspersky online scan",
        "check file for virus",
        "false alarm",
        "false detection",
        "false positive",
        "online virus",
        "scanner",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "ualberta",
        "ualberta http",
        "xormozilla",
        "disableduck",
        "virus",
        "static",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "platform",
        "triage",
        "report",
        "reported",
        "analyze",
        "filesize",
        "set value",
        "iocs",
        "process",
        "process key",
        "monitor",
        "resource",
        "config",
        "target",
        "generic",
        "javascript",
        "static analyzer",
        "analyzer",
        "Microsoft",
        "YEG",
        "UAlberta",
        "Google",
        "AHS",
        "Covenant Health"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d/68e01fdde76500b3c20326c4",
        "https://metadefender.com/results/file/bzI1MTAwMzhvTXdHbkVaZGItcW0tbnU2Nmkx_mdaas",
        "https://opentip.kaspersky.com/5E066617CC959DBAB123F23D5D36A4DC4D813358E43EDDBD1A6E7C87827C301D/?tab=upload",
        "https://hybrid-analysis.com/sample/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d",
        "https://www.filescan.io/uploads/68e01279f377ab2310519c81/reports/02a0a465-8936-4b6d-99a2-6950b71ab1c5/ioc",
        "https://tria.ge/251003-x8c56azky6/behavioral2",
        "https://www.virustotal.com/gui/file/5e066617cc959dbab123f23d5d36a4dc4d813358e43eddbd1a6e7c87827c301d?nocache=1",
        "https://app.threat.zone/submission/db9c1a4a-a706-4ed9-9229-4190f02151bc/overview"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1135",
          "name": "Network Share Discovery",
          "display_name": "T1135 - Network Share Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [
        "Education",
        "Government",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4203,
        "CIDR": 8,
        "CVE": 13,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 25,
        "FileHash-SHA256": 74,
        "domain": 115,
        "email": 14,
        "hostname": 76
      },
      "indicator_count": 4559,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 131,
      "modified_text": "168 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "677aa5b98397262e59834109",
      "name": "openai versus chatGPT",
      "description": "Hybrid analysis Last Anti-Virus Scan: 2025-01-05 19:48:34 (UTC). Tor Relays/Routers and TOR exit nodes were found in network analysis.\nMore scans: https://www.hybrid-analysis.com/search?query=https%3A%2F%2Fchatgpt.com",
      "modified": "2025-02-04T00:02:22.785000",
      "created": "2025-01-05T15:31:05.222000",
      "tags": [
        "chatgpt",
        "openai",
        "tor",
        "placeholder.com",
        "via.placeholder.com",
        "placehold.it",
        "StableAI.exe"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/cf28065e6e2a8ac8812d5cc41ae2141d229a085afb155e158572d9c2fd36d540/66bbc7e33b8b45473008558b",
        "https://www.virustotal.com/graph/embed/gb3908392fffd416897fdba90855a10f8c6da0c83d6a14fc78d62c02db8af634e",
        "https://www.virustotal.com/graph/embed/gc3788134fb984a599fbe5d92802d605be2afeb3505b14133910e150c49a5aa06",
        "https://www.virustotal.com/graph/embed/gc506b9318cdc451fb978cb7e201885605b0ab4ffca7344f3af0f76846bae8626",
        "https://www.virustotal.com/graph/embed/gf7f57a7abbc14cf3bf154e66e1bd8b3a4cd225542f9d4c0e92cb567c86940425",
        "https://www.virustotal.com/graph/embed/gd5ad7b36d7624fe48377ef36384ae281b540af91c4c14a1791d96a8a79712135",
        "https://www.virustotal.com/graph/embed/g2363a9b3ae0a422caff8d99caa57563691cf0817bd9346a8ba5a500349e71c2e",
        "https://www.virustotal.com/graph/embed/g064afe96384849bc81925f0defec631142ebb68b53854add8aba403d2989138a"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 8,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "userlolxxl",
        "id": "276085",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_276085/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4,
        "FileHash-SHA256": 3,
        "domain": 3,
        "hostname": 1
      },
      "indicator_count": 11,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 36,
      "modified_text": "439 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://chatgpt.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://chatgpt.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638759.2412877
}