{
  "type": "URL",
  "indicator": "https://cloud.instem.com/logon/LogonPoint/tmindex.html",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cloud.instem.com/logon/LogonPoint/tmindex.html",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4141437119,
      "indicator": "https://cloud.instem.com/logon/LogonPoint/tmindex.html",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "68feb98a8c1b75b4431a3e8e",
          "name": "LevelBlue - Open Threat Exchange (userlolxxl) Administrator?",
          "description": "LevelBlue - Open Threat Exchange (userlolxxl) Administrator? 1.) (userlolxxl)  is also disable_duck, has an unhealthy interest in the Tsara Brashears \u2018dead yet\u2019 theory , has many profiles. His issues are self made by grabbing vulnerabilities found and linking them to a fake University website. We checked. Profile belongs to a group causing needless distraction and hooking users into the \u2018No Problems\u2019 group. \n\nWe swiftly got Regis University to take notice of Palantirs Prometheus Intelligence Technology tracking. Dean let semester begin putting students at risk despite warnings from Tsara Brashears of owa canary cookie in server, to replace computers , halt school , deal with issue. RU ignored issues,  Brashears didn\u2019t. They went black , blacklisted Tsara  warning of credible death threats on dark web.",
          "modified": "2025-11-25T20:05:31.749000",
          "created": "2025-10-27T00:15:06.191000",
          "tags": [
            "html internet",
            "html document",
            "ascii text",
            "language",
            "cve202323397",
            "iframe tags",
            "tag manager",
            "gtmkvjvztk",
            "anchor hrefs",
            "info ta0011",
            "protocol",
            "layer protocol",
            "port",
            "t1571 encrypted",
            "channel",
            "t1573 malware",
            "tree",
            "oc0006 http",
            "c0014",
            "get http",
            "dns resolutions",
            "resolved ips",
            "user",
            "data",
            "datacrashpad",
            "edge",
            "v full",
            "reports v",
            "chrome u",
            "appdata local",
            "googlechrome u",
            "u ser",
            "cname",
            "ip address",
            "http",
            "accept",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "shutdown",
            "extraction",
            "suggested iocs",
            "data upload",
            "cry dee",
            "stop",
            "type",
            "url indicator",
            "enter",
            "failed",
            "se share",
            "extrac",
            "enter so",
            "passive dns",
            "urls",
            "hostname add",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "address",
            "location united",
            "asn as20473",
            "dynamicloader",
            "directui",
            "write c",
            "intel",
            "ms windows",
            "pe32",
            "element",
            "delete c",
            "document file",
            "v2 document",
            "explorer",
            "trojandropper",
            "write",
            "markus",
            "august",
            "movie",
            "insert",
            "pulse submit",
            "url analysis",
            "asn as8068",
            "united",
            "entries",
            "body",
            "please",
            "x msedge",
            "ipv4 add",
            "present sep",
            "present oct",
            "present feb",
            "status",
            "unknown ns",
            "search",
            "name servers",
            "present jul",
            "aaaa",
            "present apr",
            "trojan",
            "medium",
            "high",
            "yara rule",
            "globalc",
            "june",
            "malware",
            "win64",
            "unknown",
            "america flag",
            "twitter",
            "hostname",
            "domain add",
            "reverse dns",
            "america asn",
            "present aug",
            "a domains",
            "moved",
            "first pqc",
            "unknown aaaa",
            "title",
            "meta",
            "window",
            "encrypt",
            "pulse indicator",
            "body doctype",
            "welcome",
            "ok server",
            "gmt content",
            "atlanta",
            "abuse",
            "agent",
            "service",
            "present jun",
            "present may",
            "creation date",
            "record value",
            "servers",
            "libretv meta",
            "certificate",
            "value",
            "whois lookup",
            "loopia ab",
            "userlolxxl"
          ],
          "references": [
            "http://clients2.google.com/time/1/current?cup2key=8:A2NSA9XiMjwnv2lppZDHJSlUjwebkbP0FRGtnA3Onzw&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
            "OTX issues | http://oracle.com/contracts.- I\u2019m wondering if vulnerabilities found put us on a watchlist",
            "It\u2019s not  doesn\u2019t bother me. This is a great tool for quick ACCURATE results. Watch it happen live!",
            "pegasus.thalamus.nz \u2022 http://pegasus.thalamus.nz\t\u2022 https://pegasus.thalamus.nz",
            "Personally Interested:  sebastianfoliaco.com \u2022 sebagofinland.com \u2022 cpcontacts.sebastianfoliaco.com",
            "docs-api-staging.foundry.io \u2022  foundry.neconsside.com \u2022  http://foundry.neconsside.com \u2022 https://foundry.neconsside.com",
            "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930933603/trips",
            "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930956545",
            "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930985776/trips",
            "https://hs.ecam.com/your-challenges-ecams-solutions",
            "https://teja8.kuikr.com/i6/20181130/Apple \u2022 https://teja8.kuikr.com/images/chat/new-chat/apple.png \u2022",
            "https://cdn-api.ravendawn.online/assets/apple-YLDDa8Br.png&quot\t hostname\tas.ultraapple.ipv64.net\t\u2022ipv64.net \u2022https://cdn.goilobby.com/email-notifications/addtoapplewallet.png \u2022 https://as.ultraapple.ipv64.net/",
            "Thalamus.nz - Registrar Dreamscape Networks International Pte Ltd t/a Crazy Domains"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Wannacry",
              "display_name": "Wannacry",
              "target": null
            },
            {
              "id": "Foundry",
              "display_name": "Foundry",
              "target": null
            },
            {
              "id": "Trojan:Win32/Comisproc!gmb",
              "display_name": "Trojan:Win32/Comisproc!gmb",
              "target": "/malware/Trojan:Win32/Comisproc!gmb"
            },
            {
              "id": "Trojandropper:Win32/VB.IL",
              "display_name": "Trojandropper:Win32/VB.IL",
              "target": "/malware/Trojandropper:Win32/VB.IL"
            },
            {
              "id": "#Exploit:Win32/CVE- 2023 - 23397",
              "display_name": "#Exploit:Win32/CVE- 2023 - 23397",
              "target": "/malware/#Exploit:Win32/CVE- 2023 - 23397"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "ALF:PulZati:Worm:Win32/Mydoom",
              "display_name": "ALF:PulZati:Worm:Win32/Mydoom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 8,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 248,
            "FileHash-SHA1": 134,
            "FileHash-SHA256": 2661,
            "URL": 6257,
            "domain": 682,
            "email": 8,
            "hostname": 2077,
            "CVE": 1
          },
          "indicator_count": 12068,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "144 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f5cfa9b74d6faa43eb6585",
          "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
          "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-20T05:59:04.173000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f80aa152fdd795fa008e2e",
          "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
          "description": "",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-21T22:35:13.128000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68f5cfa9b74d6faa43eb6585",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://clients2.google.com/time/1/current?cup2key=8:A2NSA9XiMjwnv2lppZDHJSlUjwebkbP0FRGtnA3Onzw&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "https://hs.ecam.com/your-challenges-ecams-solutions",
        "OTX issues | http://oracle.com/contracts.- I\u2019m wondering if vulnerabilities found put us on a watchlist",
        "https://teja8.kuikr.com/i6/20181130/Apple \u2022 https://teja8.kuikr.com/images/chat/new-chat/apple.png \u2022",
        "pegasus.thalamus.nz \u2022 http://pegasus.thalamus.nz\t\u2022 https://pegasus.thalamus.nz",
        "It\u2019s not  doesn\u2019t bother me. This is a great tool for quick ACCURATE results. Watch it happen live!",
        "docs-api-staging.foundry.io \u2022  foundry.neconsside.com \u2022  http://foundry.neconsside.com \u2022 https://foundry.neconsside.com",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930985776/trips",
        "https://cdn-api.ravendawn.online/assets/apple-YLDDa8Br.png&quot\t hostname\tas.ultraapple.ipv64.net\t\u2022ipv64.net \u2022https://cdn.goilobby.com/email-notifications/addtoapplewallet.png \u2022 https://as.ultraapple.ipv64.net/",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930933603/trips",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930956545",
        "Personally Interested:  sebastianfoliaco.com \u2022 sebagofinland.com \u2022 cpcontacts.sebastianfoliaco.com",
        "Thalamus.nz - Registrar Dreamscape Networks International Pte Ltd t/a Crazy Domains"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Pegasus",
            "Worm:win32/autorun.xxy!bit",
            "#exploit:win32/cve- 2023 - 23397",
            "Wannacry",
            "Trojandropper:win32/vb.il",
            "Foundry",
            "Alf:pulzati:worm:win32/mydoom",
            "Trojan:win32/comisproc!gmb"
          ],
          "industries": [],
          "unique_indicators": 20409
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/instem.com",
    "whois": "http://whois.domaintools.com/instem.com",
    "domain": "instem.com",
    "hostname": "cloud.instem.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "68feb98a8c1b75b4431a3e8e",
      "name": "LevelBlue - Open Threat Exchange (userlolxxl) Administrator?",
      "description": "LevelBlue - Open Threat Exchange (userlolxxl) Administrator? 1.) (userlolxxl)  is also disable_duck, has an unhealthy interest in the Tsara Brashears \u2018dead yet\u2019 theory , has many profiles. His issues are self made by grabbing vulnerabilities found and linking them to a fake University website. We checked. Profile belongs to a group causing needless distraction and hooking users into the \u2018No Problems\u2019 group. \n\nWe swiftly got Regis University to take notice of Palantirs Prometheus Intelligence Technology tracking. Dean let semester begin putting students at risk despite warnings from Tsara Brashears of owa canary cookie in server, to replace computers , halt school , deal with issue. RU ignored issues,  Brashears didn\u2019t. They went black , blacklisted Tsara  warning of credible death threats on dark web.",
      "modified": "2025-11-25T20:05:31.749000",
      "created": "2025-10-27T00:15:06.191000",
      "tags": [
        "html internet",
        "html document",
        "ascii text",
        "language",
        "cve202323397",
        "iframe tags",
        "tag manager",
        "gtmkvjvztk",
        "anchor hrefs",
        "info ta0011",
        "protocol",
        "layer protocol",
        "port",
        "t1571 encrypted",
        "channel",
        "t1573 malware",
        "tree",
        "oc0006 http",
        "c0014",
        "get http",
        "dns resolutions",
        "resolved ips",
        "user",
        "data",
        "datacrashpad",
        "edge",
        "v full",
        "reports v",
        "chrome u",
        "appdata local",
        "googlechrome u",
        "u ser",
        "cname",
        "ip address",
        "http",
        "accept",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "shutdown",
        "extraction",
        "suggested iocs",
        "data upload",
        "cry dee",
        "stop",
        "type",
        "url indicator",
        "enter",
        "failed",
        "se share",
        "extrac",
        "enter so",
        "passive dns",
        "urls",
        "hostname add",
        "pulse pulses",
        "files",
        "domain",
        "files ip",
        "address",
        "location united",
        "asn as20473",
        "dynamicloader",
        "directui",
        "write c",
        "intel",
        "ms windows",
        "pe32",
        "element",
        "delete c",
        "document file",
        "v2 document",
        "explorer",
        "trojandropper",
        "write",
        "markus",
        "august",
        "movie",
        "insert",
        "pulse submit",
        "url analysis",
        "asn as8068",
        "united",
        "entries",
        "body",
        "please",
        "x msedge",
        "ipv4 add",
        "present sep",
        "present oct",
        "present feb",
        "status",
        "unknown ns",
        "search",
        "name servers",
        "present jul",
        "aaaa",
        "present apr",
        "trojan",
        "medium",
        "high",
        "yara rule",
        "globalc",
        "june",
        "malware",
        "win64",
        "unknown",
        "america flag",
        "twitter",
        "hostname",
        "domain add",
        "reverse dns",
        "america asn",
        "present aug",
        "a domains",
        "moved",
        "first pqc",
        "unknown aaaa",
        "title",
        "meta",
        "window",
        "encrypt",
        "pulse indicator",
        "body doctype",
        "welcome",
        "ok server",
        "gmt content",
        "atlanta",
        "abuse",
        "agent",
        "service",
        "present jun",
        "present may",
        "creation date",
        "record value",
        "servers",
        "libretv meta",
        "certificate",
        "value",
        "whois lookup",
        "loopia ab",
        "userlolxxl"
      ],
      "references": [
        "http://clients2.google.com/time/1/current?cup2key=8:A2NSA9XiMjwnv2lppZDHJSlUjwebkbP0FRGtnA3Onzw&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "OTX issues | http://oracle.com/contracts.- I\u2019m wondering if vulnerabilities found put us on a watchlist",
        "It\u2019s not  doesn\u2019t bother me. This is a great tool for quick ACCURATE results. Watch it happen live!",
        "pegasus.thalamus.nz \u2022 http://pegasus.thalamus.nz\t\u2022 https://pegasus.thalamus.nz",
        "Personally Interested:  sebastianfoliaco.com \u2022 sebagofinland.com \u2022 cpcontacts.sebastianfoliaco.com",
        "docs-api-staging.foundry.io \u2022  foundry.neconsside.com \u2022  http://foundry.neconsside.com \u2022 https://foundry.neconsside.com",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930933603/trips",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930956545",
        "https://cloud.eu.samsara.com/o/562949953429579/fleet/reports/cameras/844424930985776/trips",
        "https://hs.ecam.com/your-challenges-ecams-solutions",
        "https://teja8.kuikr.com/i6/20181130/Apple \u2022 https://teja8.kuikr.com/images/chat/new-chat/apple.png \u2022",
        "https://cdn-api.ravendawn.online/assets/apple-YLDDa8Br.png&quot\t hostname\tas.ultraapple.ipv64.net\t\u2022ipv64.net \u2022https://cdn.goilobby.com/email-notifications/addtoapplewallet.png \u2022 https://as.ultraapple.ipv64.net/",
        "Thalamus.nz - Registrar Dreamscape Networks International Pte Ltd t/a Crazy Domains"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Wannacry",
          "display_name": "Wannacry",
          "target": null
        },
        {
          "id": "Foundry",
          "display_name": "Foundry",
          "target": null
        },
        {
          "id": "Trojan:Win32/Comisproc!gmb",
          "display_name": "Trojan:Win32/Comisproc!gmb",
          "target": "/malware/Trojan:Win32/Comisproc!gmb"
        },
        {
          "id": "Trojandropper:Win32/VB.IL",
          "display_name": "Trojandropper:Win32/VB.IL",
          "target": "/malware/Trojandropper:Win32/VB.IL"
        },
        {
          "id": "#Exploit:Win32/CVE- 2023 - 23397",
          "display_name": "#Exploit:Win32/CVE- 2023 - 23397",
          "target": "/malware/#Exploit:Win32/CVE- 2023 - 23397"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "ALF:PulZati:Worm:Win32/Mydoom",
          "display_name": "ALF:PulZati:Worm:Win32/Mydoom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 8,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 248,
        "FileHash-SHA1": 134,
        "FileHash-SHA256": 2661,
        "URL": 6257,
        "domain": 682,
        "email": 8,
        "hostname": 2077,
        "CVE": 1
      },
      "indicator_count": 12068,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "144 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f5cfa9b74d6faa43eb6585",
      "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
      "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-20T05:59:04.173000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f80aa152fdd795fa008e2e",
      "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
      "description": "",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-21T22:35:13.128000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68f5cfa9b74d6faa43eb6585",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cloud.instem.com/logon/LogonPoint/tmindex.html",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cloud.instem.com/logon/LogonPoint/tmindex.html",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776615908.735505
}