{
  "type": "URL",
  "indicator": "https://cloud.s334f5b4fe.chat.copilot-cloud.net/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cloud.s334f5b4fe.chat.copilot-cloud.net/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4141432775,
      "indicator": "https://cloud.s334f5b4fe.chat.copilot-cloud.net/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "68fc1699f9c0e3723c478503",
          "name": "GoBot - Network Bind causes unusual traffic the to affected",
          "description": "DGA Domain: Foundry type |\nYara: Delphi\nWin.Trojan.Gobot-20 | \nBackdoor:Win32/Gobot.AE\nIDS Detections:\nBehavioral Unusual Port 139 traffic Potential Scan or Infection\nBehavioral Unusual Port 445 traffic Potential Scan or Infection\n\nAlerts: \nnetwork_bind ,\nnetwork_icmp ,\nsuricata_alert , \ndead_connect ,\npowershell_request ,\nenumerates_running_processes ,\nprocess_needed ,\nreads_self ,\nnetwork_multiple_direct_ip_connections ,",
          "modified": "2025-11-24T00:03:55.362000",
          "created": "2025-10-25T00:15:21.759000",
          "tags": [
            "msie",
            "chrome",
            "united kingdom",
            "unknown a",
            "united",
            "passive dns",
            "ip address",
            "godaddy",
            "creation date",
            "date",
            "title",
            "body",
            "encrypt",
            "qax00x8bxc0xff",
            "potential scan",
            "medium",
            "infection",
            "port",
            "unusual port",
            "x00xc3x8d",
            "high",
            "ghost bot",
            "alerts",
            "copy",
            "powershell",
            "write",
            "delphi",
            "win32",
            "malware",
            "backdoor",
            "delphi alerts",
            "related tags",
            "none file",
            "type pexe",
            "pe32",
            "intel",
            "ms windows",
            "date june",
            "pm size",
            "sha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1971,
            "FileHash-SHA1": 13,
            "domain": 120,
            "hostname": 158,
            "FileHash-SHA256": 204,
            "FileHash-MD5": 13,
            "CVE": 1
          },
          "indicator_count": 2480,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68fc1ecf2b0215ed954eb099",
          "name": "Nework Bind -GoBot",
          "description": "Coda Systems Test Probes Interfacing Components |  Network Attack: \nStarts servers listening on 0.0.0.0:113\t,\nnetwork_icmp : Generates some ICMP traffic ,\nsuricata_alert : Created network traffic indicative of malicious activity ,\ndead_connect : Attempts to connect to a dead IP:Port (1449 unique times)\t,\npowershell_request:  is sending data to a remote host ,\nenumerates_running_processes :Enumerates running processes ,\nprocess_needed: Repeatedly searches for a not-found process, may want to run with startbrowser=1 option\t,\nreads_self : Reads data out of its own binary image ,\nnetwork_multiple_direct_ip_connections\tMultiple dire ,\n\n [OTX auto populated - The following is the full text of the report on the findings from the Coda-systems.co.uk project, which aims to identify and identify the names of all the UK's web addresses.]",
          "modified": "2025-11-24T00:03:55.362000",
          "created": "2025-10-25T00:50:23.782000",
          "tags": [
            "united kingdom",
            "unknown a",
            "script domains",
            "script urls",
            "passive dns",
            "great britain",
            "backdoor",
            "entries",
            "next associated",
            "script script",
            "date",
            "msie",
            "chrome",
            "urls",
            "type",
            "media type",
            "gmt content",
            "certificate",
            "pulse submit",
            "title",
            "body",
            "encrypt",
            "search",
            "unknown ns",
            "coda",
            "present sep",
            "meta",
            "present oct",
            "a domains",
            "test probes",
            "qax00x8bxc0xff",
            "potential scan",
            "medium",
            "infection",
            "port",
            "unusual port",
            "x00xc3x8d",
            "high",
            "ghost bot",
            "alerts",
            "copy",
            "powershell",
            "write",
            "delphi",
            "win32",
            "malware",
            "enumerates",
            "reads",
            "multiple",
            "medium ids",
            "exploits"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2173,
            "FileHash-MD5": 13,
            "FileHash-SHA1": 14,
            "FileHash-SHA256": 459,
            "domain": 191,
            "hostname": 307,
            "CVE": 3
          },
          "indicator_count": 3160,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f5cfa9b74d6faa43eb6585",
          "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
          "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-20T05:59:04.173000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f80aa152fdd795fa008e2e",
          "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
          "description": "",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-21T22:35:13.128000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68f5cfa9b74d6faa43eb6585",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Worm:win32/autorun.xxy!bit"
          ],
          "industries": [],
          "unique_indicators": 12953
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/copilot-cloud.net",
    "whois": "http://whois.domaintools.com/copilot-cloud.net",
    "domain": "copilot-cloud.net",
    "hostname": "cloud.s334f5b4fe.chat.copilot-cloud.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "68fc1699f9c0e3723c478503",
      "name": "GoBot - Network Bind causes unusual traffic the to affected",
      "description": "DGA Domain: Foundry type |\nYara: Delphi\nWin.Trojan.Gobot-20 | \nBackdoor:Win32/Gobot.AE\nIDS Detections:\nBehavioral Unusual Port 139 traffic Potential Scan or Infection\nBehavioral Unusual Port 445 traffic Potential Scan or Infection\n\nAlerts: \nnetwork_bind ,\nnetwork_icmp ,\nsuricata_alert , \ndead_connect ,\npowershell_request ,\nenumerates_running_processes ,\nprocess_needed ,\nreads_self ,\nnetwork_multiple_direct_ip_connections ,",
      "modified": "2025-11-24T00:03:55.362000",
      "created": "2025-10-25T00:15:21.759000",
      "tags": [
        "msie",
        "chrome",
        "united kingdom",
        "unknown a",
        "united",
        "passive dns",
        "ip address",
        "godaddy",
        "creation date",
        "date",
        "title",
        "body",
        "encrypt",
        "qax00x8bxc0xff",
        "potential scan",
        "medium",
        "infection",
        "port",
        "unusual port",
        "x00xc3x8d",
        "high",
        "ghost bot",
        "alerts",
        "copy",
        "powershell",
        "write",
        "delphi",
        "win32",
        "malware",
        "backdoor",
        "delphi alerts",
        "related tags",
        "none file",
        "type pexe",
        "pe32",
        "intel",
        "ms windows",
        "date june",
        "pm size",
        "sha1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1971,
        "FileHash-SHA1": 13,
        "domain": 120,
        "hostname": 158,
        "FileHash-SHA256": 204,
        "FileHash-MD5": 13,
        "CVE": 1
      },
      "indicator_count": 2480,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "146 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68fc1ecf2b0215ed954eb099",
      "name": "Nework Bind -GoBot",
      "description": "Coda Systems Test Probes Interfacing Components |  Network Attack: \nStarts servers listening on 0.0.0.0:113\t,\nnetwork_icmp : Generates some ICMP traffic ,\nsuricata_alert : Created network traffic indicative of malicious activity ,\ndead_connect : Attempts to connect to a dead IP:Port (1449 unique times)\t,\npowershell_request:  is sending data to a remote host ,\nenumerates_running_processes :Enumerates running processes ,\nprocess_needed: Repeatedly searches for a not-found process, may want to run with startbrowser=1 option\t,\nreads_self : Reads data out of its own binary image ,\nnetwork_multiple_direct_ip_connections\tMultiple dire ,\n\n [OTX auto populated - The following is the full text of the report on the findings from the Coda-systems.co.uk project, which aims to identify and identify the names of all the UK's web addresses.]",
      "modified": "2025-11-24T00:03:55.362000",
      "created": "2025-10-25T00:50:23.782000",
      "tags": [
        "united kingdom",
        "unknown a",
        "script domains",
        "script urls",
        "passive dns",
        "great britain",
        "backdoor",
        "entries",
        "next associated",
        "script script",
        "date",
        "msie",
        "chrome",
        "urls",
        "type",
        "media type",
        "gmt content",
        "certificate",
        "pulse submit",
        "title",
        "body",
        "encrypt",
        "search",
        "unknown ns",
        "coda",
        "present sep",
        "meta",
        "present oct",
        "a domains",
        "test probes",
        "qax00x8bxc0xff",
        "potential scan",
        "medium",
        "infection",
        "port",
        "unusual port",
        "x00xc3x8d",
        "high",
        "ghost bot",
        "alerts",
        "copy",
        "powershell",
        "write",
        "delphi",
        "win32",
        "malware",
        "enumerates",
        "reads",
        "multiple",
        "medium ids",
        "exploits"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2173,
        "FileHash-MD5": 13,
        "FileHash-SHA1": 14,
        "FileHash-SHA256": 459,
        "domain": 191,
        "hostname": 307,
        "CVE": 3
      },
      "indicator_count": 3160,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "146 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f5cfa9b74d6faa43eb6585",
      "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
      "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-20T05:59:04.173000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f80aa152fdd795fa008e2e",
      "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
      "description": "",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-21T22:35:13.128000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68f5cfa9b74d6faa43eb6585",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cloud.s334f5b4fe.chat.copilot-cloud.net/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cloud.s334f5b4fe.chat.copilot-cloud.net/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642558.7517881
}